Privacy & Security
Feel confident in a platform that’s been built from the ground up with security safeguards in mind
Auvik leverages two-factor authentication, role definition, permission configurations, and audit logs to boost security and ensure only authorized users make changes to the network.
Make controlling access a breeze by integrating with your existing IdP
Auvik centralizes the management of user access by integrating with your existing identity providers, such as Okta, Azure AD, and OneLogin, among others. You can also leverage an existing Microsoft work or Google Workspace account to log into Auvik.
Make sure those accessing the network are who they say they are
All Auvik password users must enable two-factor authentication (2FA) to access our software. Better yet, if you’ve integrated Auvik with your existing IdP, we’ll let them handle the 2FA per your organization’s policy.
ROLE BASED ACCESS CONTROL
Share network info with the people you choose at the access levels you want them to have
With Auvik, you get granular control over who can do what when using our software, meaning you can easily define roles and configure permissions. You can give an employee read and write access to these 10 sites but not those 8, or allow them to see configurations without being able to make any changes. It’s all up to you.
Verify who’s connecting to and making changes to the network
You can access a complete history of all user changes to sites, devices, credentials, alert definitions, and networks, as well as restoration of config backups. With this info, you can be confident in who on your team is taking action on your behalf and easily see when someone’s done something in Auvik they shouldn’t have.