Features
User Experience | Free | Pro |
---|---|---|
Cross-Platform Access End-users can enjoy a seamless, consistent experience across mobile, tablet, and desktop devices, ensuring uninterrupted access anytime, anywhere. | ✓ | ✓ |
Omnichannel Notifications End-users stay updated with real-time notifications through email, SMS, or in-app messages, ensuring that important events and activities are never missed. | ✓ | ✓ |
Single Sign-On (SSO) End-users can access multiple applications with one login, eliminating password fatigue and boosting productivity. | ✓ | ✓ |
SSO App Center End-users can easily access all their registered apps in one place, streamlining workflow and reducing login friction. | ✓ | ✓ |
Accessibility Features End-users can enjoy an accessible experience with WCAG-compliant features, high-contrast modes, customizable text sizes, and keyboard navigation. | ✓ | ✓ |
Brand Identity End-users experience a personalized environment with full brand customization, including logos, colors, and fonts, reinforcing brand identity. | ✓ | ✓ |
Authentication | Free | Pro |
---|---|---|
Passwordless Login End-users can authenticate via devices like phones or computers, providing faster and more secure login experiences. | ✓ | ✓ |
Multi-Factor Authentication (MFA) End-users complete multiple verification steps for critical operations, adding a layer of security to ensure safe and reliable access. | ✓ | ✓ |
Email Codes End-users can log in securely without passwords by receiving email-based verification codes. | ✓ | ✓ |
SMS Codes End-users can log in quickly and securely with SMS-based codes, improving ease of access. | ✓ | ✓ |
Authenticator Apps End-users can streamline access with authenticator apps, generating login codes securely for a smooth experience. | ✓ | ✓ |
Social Logins End-users can sign in with their existing social accounts (e.g., Google or Facebook), making the login process faster and more convenient. | ✓ | ✓ |
Account Linking End-users can link multiple authentication methods to a single account, offering flexibility and ease. | ✓ | ✓ |
Passwords End-users can create and manage secure passwords with recovery options, ensuring reliable access to their accounts. | ✓ | ✓ |
Account Onboarding | Free | Pro |
---|---|---|
Self-Registration End-users can quickly get started by registering through a simple process, allowing immediate access to the platform. | ✓ | ✓ |
Self-Registration via Identity Providers End-users can register using trusted identity providers like Google or Facebook, speeding up the onboarding process. | ✓ | ✓ |
Admin-Invited Registration End-users can be securely invited by admins, ensuring a controlled onboarding experience with personalized access. | ✓ | ✓ |
Account Recovery | Free | Pro |
---|---|---|
Self-Account Recovery End-users can recover their accounts independently, reducing downtime and ensuring smooth access restoration. | ✓ | ✓ |
Admin-Assisted Recovery End-users can rely on admin-assisted recovery, providing secure access restoration when needed. | ✓ | ✓ |
Account Verification | Free | Pro |
---|---|---|
Email Verification End-users can verify their accounts through email codes | ✓ | ✓ |
Phone Verification End-users can verify their accounts using phone-based codes. | ✓ | ✓ |
eKYC Verification End-users can undergo secure identity verification using external eKYC providers | ✓ | ✓ |
In-Person Verification End-users can opt for in-person verification via an external process. | ✓ | ✓ |
Consent Management | Free | Pro |
---|---|---|
Consent Granting End-users can easily grant or revoke consent for third-party access, ensuring full control over their personal data. | ✓ | ✓ |
Consent History End-users can track and review their consent history, maintaining transparency in data usage. | ✓ | ✓ |
Consent Revocation End-users can instantly revoke consent, ensuring that their data is not accessed without permission. | ✓ | ✓ |
Data Privacy | Free | Pro |
---|---|---|
Data Access Requests End-users can request access to their personal data, offering full visibility into data usage. | ✓ | ✓ |
Data Deletion Requests End-users can request the deletion of their personal data, giving them control over their information. | ✓ | ✓ |
Data Export Requests End-users can export their personal data for record-keeping or to transfer it to other services. | ✓ | ✓ |
Data Protection End-users can trust that their data is protected with strong encryption and security measures, ensuring privacy. | ✓ | ✓ |
Account Management | Free | Pro |
---|---|---|
Profile Management End-users can easily update their profiles, including language preferences and contact details, for a personalized experience. | ✓ | ✓ |
System Preferences & UI Customization End-users can customize the UI and system preferences, making the platform more accessible and comfortable. | ✓ | ✓ |
Timezone Configuration End-users can configure their time zone to ensure accurate scheduling and reminders. | ✓ | ✓ |
Session Management | Free | Pro |
---|---|---|
Active Sessions Monitoring End-users can monitor and manage their active sessions, improving security by tracking account access. | ✓ | ✓ |
Multi-Device Access End-users can access their accounts on any device, ensuring a consistent and seamless experience across platforms. | ✓ | ✓ |
Log Out from All Devices End-users can log out from all devices at once, preventing unauthorized access and maintaining control over their security. | ✓ | ✓ |
Enterprise B2B | Free | Pro |
---|---|---|
Enterprise Logins Organizations can provide their end-users with secure, frictionless access by integrating with trusted identity providers like Microsoft Entra, Okta, and Google Workspace. | ✓ | |
Provisioning via SCIM Organizations can streamline user onboarding by automatically synchronizing profiles, roles, and permissions with enterprise systems using the SCIM protocol. | ✓ | |
Audit Logs 30 day Retention Organizations can access real-time audit logs, improving security monitoring and compliance for their end-users. | ✓ | |
Audit Logs streaming Organizations can access real-time audit logs, improving security monitoring and compliance for their end-users. | ✓ | |
OAuth Access Integration Organizations can securely integrate with your services via OAuth, ensuring seamless connections while maintaining security for their end-users. | ✓ | |
Custom Authentication Policies Organizations can define and enforce tailored authentication policies to meet their specific security and compliance needs, enhancing their end-users' security. | ✓ |
Frequently asked questions