Free to get started. No credit card required.

The World's First DevOps Security Tool Suite

Cloudentity provides a suite of tools to unify Identity and Security across on-prem networks, data centers and into the cloud. By abstracting the security configuration from the development process, Cloudentity allows you to execute a unified security strategy from the first step of software development, integrating seamlessly with your CI/CD deployment strategies, while supporting legacy infrastructure and even SaaS based third party systems.

Declarative security means taking the burden from the development team and empowering the security team. Enforcing your company’s security policies across different development teams from a configurable source-of-truth easily accelerates the production of software by 20-40%, reducing long regression testing and QA cycles, allowing for rapid response to changing threats, compliance or business needs.



CLOUDENTITY Microservice
and API Security




The Core UI and Core API allow you to create, implement and audit your Identity and Security policies in a single place in both a human-readable view for the CISO and automated for DevOps lifecycle management. As you add tools and refine your security management approach, the Core tools will expand with you.

Security Policy Configuration

The core of the Cloudentity TrUST Engine is how all we apply the information available (users, devices, applications, external threats). Providing user-friendly visualization for easy compliance auditing and a fully featured API for DevOps integration is critical to securing a single source of truth for your enterprise’s security management.

User Management

Manage every aspect of a user, including entitlements, risk level and other Identity related data. The User Management API is also useful for statistical analysis and tracking registrations, verifications, and other KPIs for your user base.

Device Management

Users are able to view and manage devices that they have used for Authentication and drive MFA behavior and view usage history.

Microservice Application Management

Your development team can interact with the Core API to register new services when using the MicroPerimeter™ Mesh. These services can inherit policies defined in the Cloudentity environment and become auditable in a single, “source of truth” central repository.

IDP Configuration

Your organization can either use the Cloudentity IDP or connect to one, or more, IDPs. The tools allow you to manage the configuration and connection with your IDPs including mapping groups for consistent security rules.

Service Provider Configuration

The Core allows you to configure security rules for applications consuming your enterprise Identity data and Microservices. Set up SAML SPs, create OAuth client credentials, and apply security rules for what those applications will have access to view.

Stats and Reports

Because all of the services are exposed over an API, Cloudentity customers are able to integrate information directly into their own BI Dashboards or other tools. We also provide a wide collection of useful reports and visualization throughout the Core UI

Organization Segmentation

Delegated administration for subgroups such as partners, multi tenant customers, or other supply chain management workflows.

Customizable Business APIs

Every company has unique challenges, and that sometimes requires custom extensions to support complex workflows. Whether developed in-house or by the Cloudentity professional services team, those custom workflows can be exposed in the Core API inheriting the same security policies and auditing as the core tools.

CLOUDENTITY Microservice and API Security

Combining DevOps best practices with a secure connection to centralized policy management, the Cloudentity Microservice and API Security tools provide unified security that the developer doesn’t have to think about (deploy in the Mesh and the security configuration takes care of the rest). Allow your software to talk to other software—safely.

API Security Gateway

As the first line of defense for the Microservices, the API Security Gateway logs traffic, adds additional security by signing requests for downstream consumption, and enforces additional rules (such as forcing MFA) before the traffic enters the data center.

MicroPerimeter™ Mesh

Security begins at the Microservice itself – the CLOUIDENTITY MicroPerimeter™ Mesh evaluates each request, both inbound AND outbound, protecting your East/West traffic based on rules defined in the Security Policy Manager in the Cloudentity Core.

Service Mesh Sync

The Service Mesh Sync creates a localized copy of the Secuirty Policies from the Cloudentity Core. This allows the MicroPerimeter™ Mesh to make localized decisions without having to make a long-haul back to the centralized source of truth, reducing enforcement time from thousands of milliseconds to less than a millisecond.


Security is a combination of Identity and Policy Enforcement -- that is to say, you have to know not only what you are securing, but who (or what) you are securing it from. Cloudentity's IAM tools allow a company to choose from supporting an existing Identity Provider (IDP), adopt a new IDP, or create a hybrid of existing tools. Add tools like MFA enforcement or values from profiles on individual services and your enterprise can create granular control down individual service level.

IDP Integration

Cloudentity offers an integration tool to connect the IAM services to an existing an Identity Provider such as an LDAP or AD solution. This allows companies with an established SSO to extend the functionality without facing a “rip and replace” solution.

IDP Services

By using the Cloudentity IDP, companies are able to access additional features such as User Registration and Self-Service Management and Device Registration.


In an era of phishing and password re-use, the need for Multi-Factor Authentication is constantly growing. And by linking security policies to trigger MFA for specific transaction, the Cloudentity MFA solution gives fine grained control with the least level of frustration to users.

Token Exchange

Many organizations have multiple IDP solutions in place and need a way to easily connect sessions without forcing a second or third login. The Cloudentity Token Exchange service is able to map sessions and entitlements from one IDP to another with a seamless user experience and minimal DevOps requirements.

SAML & OAuth Orchestration

Included with the IAM services are basic federation and authorization protocols such as SAML, OAuth, and OAuth with OIDC. Using a single sign on model with shared workflows and security policies ensures consistent security across multiple platforms and services.