privacy icon

Network Security & Privacy

privacy icon

Feel confident in a platform that’s been built from the ground up with security safeguards in mind

Auvik leverages two-factor authentication, role definition, permission configurations, and audit logs to boost security and ensure only authorized users make changes to the network.

Single Sign-on logo


Make controlling access a breeze by integrating with your existing IdP

Auvik centralizes the management of user access by integrating with your existing identity providers, such as Okta, Azure AD, and OneLogin, among others. You can also leverage an existing Microsoft work or Google Workspace account to log into Auvik.

screenshot showing mandatory 2FA


Make sure those accessing the network are who they say they are

All Auvik password users must enable two-factor authentication (2FA) to access our software. Better yet, if you’ve integrated Auvik with your existing IdP, we’ll let them handle the 2FA per your organization’s policy.

screenshot showing role based access control


Share network info with the people you choose at the access levels you want them to have

With Auvik, you get granular control over who can do what when using our software, meaning you can easily define roles and configure permissions. You can give an employee read and write access to these 10 sites but not those 8, or allow them to see configurations without being able to make any changes. It’s all up to you.

screenshot showing audit logs


Verify who’s connecting to and making changes to the network

You can access a complete history of all user changes to sites, devices, credentials, alert definitions, and networks, as well as  restoration of config backups. With this info, you can be confident in who on your team is taking action on your behalf and easily see when someone’s done something in Auvik they shouldn’t have.