Automate your day-to-day HR processes
and let the computers do the job.

Full-stack open-source
IdM solution

We have developed an IdM solution on open-source products to cover the majority of possible environments and customer business scenarios in the field of managing identities and accesses within organizations of any size.

We can integrate together and extract the maximum of available open-source tools from Evolveum and RedHat to build the whole solution from access to identity management with the feature set comparable to commercial products for a fragment of the price.

Full support of the products and our solutions is a matter of course.

cloud solution

INALOGY partnered up with Okta to provide superb all-in-one identity management that includes IdM and Access management for customers, workforce, and partners. With Okta, it is easy in one place to manage access to applications, infrastructure, and even APIs either in Cloud or On-Prem environments.

Okta delivers a top-noch user experience for users and administrators. With over Okta Integration Network with over 6500 connectors, it significantly drops time to production.

Main benefits of midPoint & Okta

Robust & scalable IdM system
A full-fledged IdM system is mainly deployed on-premise, but cloud is not an obstacle tho

Trully versatile
We are able to implement unimaginable use cases

No licence fees
Save money on licenses for good

Popular in academic
Manages millions of identities for tens of Universities around the world

Whole infrastructure covered by Okta

Full stack of features
Includes IdM for the workforce or customers together with access management

Superfast deployment
Run your business safely just in several weeks with more than 6500 available connectors

User friendly administration
Configuration is low-code to no-code

Identity management solutions
mainly adresses below listed use cases,
and many more.


Ensure that only authorized individuals can access sensitive data and applications.



When employees join an organization, Identity management helps automate this process of providing access to various systems, applications, and resources


Control what resources and data users can access, based on their role, group, or other factors.


When employees leave an organization, Identity management automatically revokes their access to systems, applications, and resources, ensuring they no longer have access to sensitive data.

User Provisioning

Automate the process of provisioning user accounts, saving time and improving security.

User Self-Service

Identity management allows users to perform these tasks as resetting passwords or updating their personal information by themselves, which reduces the workload on IT staff and improves user satisfaction.

Password Management

Manage passwords and ensure that users use strong passwords that comply with organizational policies.


Third-Party Access

Organizations often need to provide partners and customers access to systems and resources. Identity management can help manage these external users, ensuring they have the appropriate access levels and can collaborate securely with the organization.

Want to know more about our solutions?

287Identity mngmt
Access mngmt
291Identity mngmt
Perimeter protection
289Identity mngmt
Privileged access mngmt