Products – Omada

Identity Management

Omada Identity Suite empowers enterprises to manage identities across heterogeneous IT-systems and is acclaimed for its business-centric approach. The flexibility of the solution allows a high degree of configuration, enabling enterprises to meet business specific requirements. This approach reduces the need for custom development, decreasing deployment time, so ROI is achieved fast. The solution offers end-to-end user provisioning and access management.

Omada logo
Click on the logo to view more information.



Key functionality includes:




Identity lifecycle management

Identity Lifecycle Management (ILM) processes enable the granting of access rights according to defined roles, rules, and policies.

This includes standard on-boarding and off-boarding processes of employees and contractors, as well as the granting or revocation of access to resources as a user’s relationship to the business changes.

The processes are powered by Omada’s standard Business Processes. To support automated provisioning and de-provisioning of users’ access the solution includes the Omada Provisioning Service. Target system provisioning can be automated from policy-driven access rules and defined roles, or can be manual, supported by integration with a service desk solution.

For connectors between Omada Provisioning Service and target systems, Omada offers a large range of standard connectors. Furthermore, Omada provides an extensive API framework for easy development of custom connectors


Role and policy management

The Omada Identity Suite offers a flexible business-centric approach based on best-practice policies for role-modelling. By defining which processes include the most business critical access policies in systems and applications, it is possible to start ensuring that existing system access and new access requests are driven by business policies and compliance requirements.

Omada Policy and Role management enables Role Based Access Control (RBAC) for managing security in large heterogeneous networks. Role management reduces both the complexity in user administration and the associated costs, thereby increasing the level of control and providing the ability to audit access rights for compliance and security audits.


Access Management

Handling of processes for on-boarding, transferring, and off-boarding employees, dealing with requests for access rights, and adapting access rights to organizational changes is time-consuming and error prone without a centralized system.

Lack of defined and enforced access management often results in employees not having access rights removed promptly when they leave the organization, and the ‘Least Privilege’ principle may not be applied consistently.

Improve Organizational Efficiency

Organizations can improve the efficiency of the user administration quickly by automating access management processes: