Easy management from the cloud
Access the admin console from a browser to manage individual or groups of user accounts. Let users manage their own credentials and personal information through a self-service portal.
Smooth user onboarding
Easily grant or revoke user access to company resources with group management.
Instant directory migration
Easily migrate users from an LDAP server, Windows AD server, Microsoft 365, Google Workspace, or by importing a CSV file.
Convenient self-service portal
Free up IT teams' workloads by letting users reset their password, secondary email address, phone number, address, and more.
Secure and seamless access
Create on-premises LDAP servers for fast local authentication. Streamline authentication for SaaS applications with SSO and user account provisioning.
C2 Identity's low-latency hybrid architecture lets you authenticate locally through an LDAP server for fast offline authentication.
Deploy an on-premises LDAP server node using a Synology NAS, or as a Docker container.
Authenticate services locally through an LDAP server without needing to connect to the cloud.
All devices from one portal
Administer your entire organization's Windows and macOS workstations and provision new devices from a centralized console.
Manage thousands of devices by installing the agent to workstations individually or at scale through Windows AD or Jamf.
Improve security across devices by enforcing policies, including disabling USB storage, configuring screenlock settings, and more.
Deploy custom scripts across multiple devices to simplify installing software, performing maintenance, generating compliance reports, and more.
Missing device protection
Protect sensitive data by remotely shutting down, wiping, or locking a device.
Protect all user credentials on C2 Identity with the Secure Remote Password (SRP) protocol and complex password requirements.
Secure credential protection
C2 Identity communicates with clients using SRP, a secure zero-knowledge password protocol. SRP generates a secure encryption key and provides authentication without ever sending password-equivalent data over the network, thereby protecting against man-in-the-middle attacks.
Customize password requirements
Protect user identities by enforcing complex passwords and enabling multi-factor authentication (MFA) with Time-based One-time Passwords (TOTPs).
Password-based sign-in processes require a compatible browser extension.