World-Class, Economical, Intelligent IAM for Every Organization


We make Identity and Access Management an exhilarating experience.

We change old IAM paradigms through innovation.

We continue to work with our customers beyond technology implementation.

We do not force fit one product for every customer.

Through providing value added services to traditional IAM solutions, we keep in touch with customer realities.

We enable you choose the right solution, sometimes even if it is from our competitor


Why Compact Identity?

For the first time there is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons. This includes Access Management as well as Identity Governance and Administration.

A unique online digital guidance system helps you implement the solution step-by-step and at your own pace. Unlike other vendors, Ilantus also offers implementation support as per your needs at no extra charge.


Single Sign On

SSO to any app

Seamless SSO with ‘no app left behind’, including on-premise and thick-client apps. Web apps, federated, non-federated, thick-client, legacy or custom apps – will all be included in your SSO environment. Mobile apps and IOT devices are supported too. Homegrown app? Our interactive digital help guide ensures that this will not be an issue. And, if you need assistance with it, call Ilantus’ dedicated helpline available 24 hours from Monday to Friday and we will do the integration for you.

App Store

Database of commonly used apps, pre-configured, and ready to download. Custom or homegrown apps can be integrated easily.

Browser Preference

Experience superior optimization when each app launches in its preferred browser – a simple configuration that only takes a few clicks.

Shared App Login

Save money by sharing app licenses. Compact Identity can allow multiple employees to use a single license during different sessions, and yet protect the app password from all the users. Accountability for all users of a license through audits is also supported

Universal Directory

Compact Identity comes with a Universal Directory at no extra cost. AD licensing is expensive. If your business doesn’t feel the need for an AD at all or only wants to create AD accounts where they are required, the Universal Directory is the cost-effective way to create identities in your IT environment.


Authentication verifies that a user is who they say they are when – accessing a target application/system, recovering a forgotten password and unlocking an account.

This is possible with step up or multiple authentication mechanism factors (MFA) such as:

  • What the user knows – Password, Challenge Response
  • What the user has – Email / SMS OTP, Soft Tokens
  • What the user is – Biometric


Risk based Authentication

Compact Identity uses real time intelligence to calculate a user’s risk score based on factors such as device, location, and network connection. The system then associates a risk rating based on the context and decides to:

  • Allow the user access or
  • Prompt another level of authentication or
  • Simply deny the access if the risk score is high


Password Management

Compact Identity possesses the most comprehensive password management system anywhere in the industry. Not only does it provide capabilities to reset forgotten passwords, it also synchronizes passwords from apps that are not connected to your AD.

Password Synchronization

Eliminate wasted time and avoid confusion when passwords that are changed or reset within Compact Identity, or within apps, are synced with one other.

  • Forward Password Sync: Password changes in Compact Identity are synced with your AD
  • Reverse Password Sync: AD password changes are synced with Compact Identity


Password Reset – Helpdesk Assisted

Empower your Helpdesk to perform password resets from their end, utilizing the Compact Identity interface.


Password Reset – User Initiated

We all forget passwords and even when we don’t, we must change them from time-to-time for security reasons. Our solution allows you to reset forgotten passwords at any time or change passwords on a schedule.




Identity Governance

Today, perhaps the most important part of an IAM solution, is Identity Governance. This technology allows you to govern your identities and accesses for complete compliance and audit control. Unfortunately, access management solutions in the market offer only shallow identity governance capabilities. Compact Identity, however, offers this at the deepest possible level. It even utilizes advanced analytics and business intelligence to power up your dashboards and display the most critical identity and access parameters on the fly.


Access Request:

Compact Identity enables your employees to request accesses to roles, apps and entitlements by themselves. Users can see the risk score of an entitlement they are requesting, whether their peers have such accesses, their chances of getting it approved and the average turnaround time for access to be granted. This intelligent decision-making guidance increases the efficiency of what would normally be a simple but frustrating mechanical process.


Self-service Access Request

To roles, apps, entitlements (supported with analytics and system suggestions) and request for any attribute to reduce risks


Multi-level approvals

Get set with multiple levels to approve a high-risk access


Manager approval

Supported by analytics and risk metrics, enable managers to take right decisions by providing required information on the fly.


Delegated approval

Allow managers to delegate if not confident in taking decision


Access Certification

A safe business not only utilizes a secure access provisioning system but reviews access rights regularly. Our solution automates user access reviews and, if configured, revokes accesses that are no longer suitable, or, pushes notifications to various target systems for managers to review. Compact Identity pushes the details of access reviews that are scheduled to be performed to managers, owners, or security specialists in non-technical language that is easy to understand.



Access Review/Certification

Regularly monitor ‘who has access to what’


Multi-level review

Reassess the appropriateness of accesses at specified intervals


Auto Fulfilment

Ensures that all access that are no longer required are terminated


Orphan Account Identification and Management

Sometimes accounts can become ‘orphaned’ when they no longer have a valid user. Such accounts present a critical security risk because they can be used and accessed without any person being accountable for actions performed within these accounts. Compact Identity detects orphan accounts and enables admins to delete them. This automation also saves your business money by freeing up licenses.


Compliance Reports

Choose from a host of pre-configured reports. Or, customize reports for exclusive needs. View these reports on your dashboard with trends and other analyses.


For Datasheet Please Click here: