Authorization and access management
With i-doit, you can document and manage authorizations and access in a structured and traceable manner.
Access rights to systems, applications, rooms and infrastructures are recorded centrally and clearly assigned to persons, roles or departments.
4.7/5 on Capterra | 2,000+ satisfied customers

The 6 most important functions for authorization and access management
Access rights to systems, applications, networks, rooms and infrastructure are recorded and managed centrally.
Permissions are clearly assigned to persons, roles or organizational units, so it is always clear who has which access.
Role-based authorization models can be documented and reused in a structured manner.
Changes to authorizations remain fully documented and traceable - including the time and the person responsible.
Authorizations can be assigned or withdrawn in a structured manner when joining, changing roles or leaving.
Control authorizations by location
How can authorizations be controlled based on location?
In organizations with several locations, branch offices or sensitive areas, it is crucial to know who has access where. Without structured documentation, unclear or outdated authorizations can quickly arise.
i-doit enables location-based documentation and evaluation of access and authorization information. Authorizations for systems, rooms, infrastructure or technical equipment are clearly assigned to individual locations and can be adjusted at any time.
Advantages:
- Clear transparency of access rights per location
- Reduced risk due to outdated or unclear authorizations
- Simple evaluation for audits and security checks
- Better control for multiple locations or branch offices
- Reliable basis for site-specific security concepts

Authorizations according to object and device classes
How do authorizations by object and device class provide an overview?
In heterogeneous IT and infrastructure landscapes, it is difficult to properly maintain access rights to individual objects. This increases complexity and susceptibility to errors.
i-doit structures authorizations according to object types and device classes. Access can be defined specifically for servers, network devices, workstations, medical devices or applications - regardless of the specific individual object.
Advantages:
- Clear structuring of authorizations according to device types
- Better overview of many systems and assets
- Simplified maintenance of access rights
- Reduced risk due to incorrectly assigned authorizations
- Clean basis for audits and security checks

Link to responsible persons and users
How does the link to responsible persons and users create clarity?
Without clear assignment, it is often unclear in everyday life who uses which device or is responsible for what. This makes troubleshooting, handovers and organizational changes more difficult.
i-doit clearly links assets and workstations to people, roles or departments. The assignment remains traceable even in the event of changes or substitutions and can be adjusted without any loss of information.
Advantages:
- Clear assignment of devices and workstations
- Clear responsibilities without ambiguity
- Fewer queries in the event of faults or handovers
- Clean documentation for employee changes
- Reliable basis for audits and internal controls

Access to certain categories of information
How can access to certain categories of information be specifically controlled?
Not all information is relevant or accessible for every role. Without differentiated control, there is a risk of unauthorized access to sensitive data.
i-doit makes it possible to restrict access to specific categories of information. Users only see the content that is required for their tasks, while sensitive data remains protected. The access structure is transparently documented and can be flexibly adapted.
Advantages:
- Protection of sensitive information through targeted access restriction
- Clear separation of technical, organizational and confidential data
- Reduced risk due to unauthorized access
- Structured authorizations instead of blanket approvals
- Secure basis for data protection, audits and compliance

Book your personal live demo
Our i-doit team will be happy to take the time to advise you personally on your application.
Suitable add-ons
Our add-ons for modular function expansion
Create powerful automations without programming knowledge, simply start them on a schedule or manually at the touch of a button.
Get 4 powerful add-ons for the price of 2! Flows, Documents, Analysis and Forms.
Automatically create documents as PDFs with daily updated data (e.g. hardware handover certificate or disaster recovery plan).
Automate the operation of your data center with the latest data from the CMDB. Events trigger and control further processes.
The maintenance add-on supports the planning, execution and documentation of maintenance and inspections. Maintenance intervals, dates and responsibilities are managed centrally and linked directly to the respective devices, installations or systems.
With the API add-on, data can be automatically read, written and updated in i-doit. Perfect for integrations with ticket systems, inventory tools or your own automations.
Add-on for powerful data analysis. Calculate service costs, check the data quality of the CMDB and carry out failure simulations.
Easily create forms that you can make available to users for simplified data entry. Example: Allow users to document hardware or goods themselves.
Set up an information security management system with risk analysis and management in accordance with ISO 27001.
Integrate the Checkmk2 monitoring system into i-doit. This supports comparisons between TARGET and ACTUAL from CMDB and monitoring.
Store buttons with your own triggers and start IT processes directly from i-doit - e.g. the automatic deployment of a virtual machine.
With this add-on, you can create an information security management system (ISMS) in accordance with the BSI's IT baseline protection methodology.
Related use cases
i-doit offers companies comprehensive functions and interfaces

You connect ticket systems, automation tools and monitoring systems such as Zammad or n8n directly via API.

You document workstations with devices, peripherals and responsible persons and control handovers and returns centrally.

You control audits centrally, plan audits, document results and automatically generate audit reports.

You analyze your IT infrastructure, identify documentation gaps and create location, user or cost centre-related reports and audit PDFs.

You are automatically informed about deadlines, licenses and guarantees and can keep an eye on the status and need for action.

You automatically record clients, servers, printers and peripherals and document hardware, software and QR codes centrally.

You manage users, accounts and rights centrally, document responsibilities and control access per system, including LDAP and group connections.

You document data protection incidents in compliance with the GDPR, assess risks and derive measures centrally.

You can manage documents in an audit-proof manner, version and edit them directly in the tool and use templates and import functions.

You create technical and organizational restart plans with automatic calculation of the restart times.

i-doit supports GAP analyses according to standards such as ISO 27001, ISO 9001 or NIS2, including maturity level assessment, responsibilities and document assignment.

You link tickets to affected devices, analyze causes via dependencies and monitor SLAs centrally.

You record and uniquely identify assets using QR and barcodes, create individual labels and take a mobile inventory of devices using the app and printer tool.

You document emergency concepts, system manuals, backups and disaster recovery centrally and comprehensibly.

They document maintenance and lifecycles, make changes traceable, automate processes and keep an eye on responsibilities and warranty periods.

You evaluate and manage suppliers centrally, document contracts and maintain contact details and replacement suppliers.

You derive measures, distribute tasks, track deadlines and receive automatic notifications by e-mail.

You integrate monitoring data directly into the IT documentation, see asset failures and link statuses to the change history.

You document active and passive network elements including cabling, port assignment, IP addresses and configurations centrally and comprehensibly.

You control entries and exits, including device handovers, returns and proof of instruction, centrally...

i-doit enables protection requirement analyses with automatic inheritance into the infrastructure, risk assessment and tracking of measures.

You document and evaluate security incidents in accordance with ISO and NIS2, assign affected assets and centrally derive measures.

You record and analyze software and licenses, monitor runtimes, users and authorizations and avoid license violations and unnecessary costs.

You document locations, rooms and infrastructure, link these to contact persons and also visualize server rooms clearly.

You document and manage contracts centrally, link them to objects and responsible parties and are automatically informed about deadlines and terms.

You keep an eye on servers, VMs, dependencies and certificates centrally and automatically synchronized.

