Set access Rules for your Application
Set access Rules for your Application
Set access Rules for your Application
Access Management enables you to grant access to users based on rules that you can define to any level
Access Management enables you to grant access to users based on rules that you can define to any level
Access Management enables you to grant access to users based on rules that you can define to any level
Deploy your portal with confidence
Access Management (AM) is a module that helps you to securely grant access to certain resources on your account. Create policies with groups of users, and determine what permissions they’ll have to access certain resources.



Take full control of your application
Application administrators get full control of their RUN application (the application that’s deployed to their end-users) by using Access Management and User Management together.
Your Rules
Easily associate IoT devices with your users. Just create individual policies to securely grant access to certain resources on your account for pre-defined targets.
Your Rules
Easily associate IoT devices with your users. Just create individual policies to securely grant access to certain resources on your account for pre-defined targets.
Your Rules
Easily associate IoT devices with your users. Just create individual policies to securely grant access to certain resources on your account for pre-defined targets.
Tag Users & Resources
Administrators can easily associate organizations, sites, departments, regions, or any other group to users. Tags can be used to group resources to automate access management.
Tag Users & Resources
Administrators can easily associate organizations, sites, departments, regions, or any other group to users. Tags can be used to group resources to automate access management.
Tag Users & Resources
Administrators can easily associate organizations, sites, departments, regions, or any other group to users. Tags can be used to group resources to automate access management.
Security
Go beyond with SSO
By using our Single Sign-On (SSO) integration, end-users are able to sign in to your RUN application using credentials from your own trusted user database. This user database can be provided by third-party services such as Okta, Microsoft Azure AD, OneLogin, PingIdentity, Google Workspace, and several other identity providers.

Security
Go beyond with SSO
By using our Single Sign-On (SSO) integration, end-users are able to sign in to your RUN application using credentials from your own trusted user database. This user database can be provided by third-party services such as Okta, Microsoft Azure AD, OneLogin, PingIdentity, Google Workspace, and several other identity providers.

Security
Go beyond with SSO
By using our Single Sign-On (SSO) integration, end-users are able to sign in to your RUN application using credentials from your own trusted user database. This user database can be provided by third-party services such as Okta, Microsoft Azure AD, OneLogin, PingIdentity, Google Workspace, and several other identity providers.

Want to start learning IoT with TagoIO?
Take the free courses available on our Learning Center
FAQ
When do I need to configure the AM (Access Manager) in my application?
When do I need to configure the AM (Access Manager) in my application?
When do I need to configure the AM (Access Manager) in my application?
How do I setup an SSO for my application?
How do I setup an SSO for my application?
How do I setup an SSO for my application?
How many levels of access can I create with the TagoIO Access Manager?
How many levels of access can I create with the TagoIO Access Manager?
How many levels of access can I create with the TagoIO Access Manager?
How do I associate the users of my IoT application with their IoT devices and dashboards?
How do I associate the users of my IoT application with their IoT devices and dashboards?
How do I associate the users of my IoT application with their IoT devices and dashboards?
How do I make resources available to my end-users?
How do I make resources available to my end-users?
How do I make resources available to my end-users?
Build. Customize. Deploy.
Deliver exceptional IoT experiences to your customers with TagoIO.
Build. Customize. Deploy.
Deliver exceptional IoT experiences to your customers with TagoIO.
Build. Customize. Deploy.
Deliver exceptional IoT experiences to your customers with TagoIO.