EN

United States (EN)

Australia (EN)

Canada (EN)

Canada (FR)

France (FR)

Germany (DE)

Ireland (EN)

United Kingdom (EN)

EN

United States (EN)

Australia (EN)

Canada (EN)

Canada (FR)

France (FR)

Germany (DE)

Ireland (EN)

United Kingdom (EN)

Identity & Access Management Software

Get access right, every time

Rippling combines an HRIS and identity provider (IdP) into one platform—unlocking stronger security with granular access controls across the user lifecycle.

Coffee Meets Bagel (Logo - Highlight)
Blockchain (Logo - Highlight)
Coffee Meets Bagel (Logo - Highlight)
Blockchain (Logo - Highlight)
Rippling IT (Highlight)
Total control over Identity, Devices, and Inventory across the user lifecycle.
Rippling idp

Single source of truth for user identity

Rippling is the only IAM solution to truly centralize user identity with a unified HRIS and IdP right out-of-the-box—no SCIM integration needed.

Keep user data in sync

Digital identities are unified across HR, devices, and third party apps, for always accurate and up-to-date user data.

Gain total visibility

Preview and control downstream effects of workforce changes during onboarding, transitions, and offboarding.

Customize alerts and automations

Configure workflows and trigger API calls based off of any action or data change inside Rippling or your connected apps.

Security

Airtight access controls

Go beyond standard SCIM attributes. Leverage hundreds of user attributes to create custom zero-trust protocols and ensure nothing slips through the cracks.

Interface showing "Grant Jira access" dialog for backend engineers, excluding those without InfoSec training and contractors.
Set dynamic access rules

From provisioning accounts to managing group access, dynamic rules automatically ensure the right people get the right level of access—even as their roles change.

Single sign-on dashboard showing various app icons including Google, AWS, GitHub, Zoom, and Microsoft with user welcome message.
Link identity across systems

Federated identity lets you handle any protocol with ease—from LDAP, Active Directory (AD), OIDC, and RADIUS, to custom SCIM and SAML apps.

Custom sign-in rule interface showing location-based security policy for Engineering Department employees accessing Jira and AWS.
Create behavioral detection rules

Strengthen cybersecurity with dynamic rules based on user roles, departments, and behaviors, like automatically locking users out of your apps after suspicious activity.

RPass password sharing interface showing options to share with all employees in Marketing and Operations departments
Control password sharing

With our built-in password manager, you’re able to enable user groups to securely store and share passwords in a zero-knowledge vault.

User lifecycle management

Deploy automations across the user lifecycle

Stay in sync with HR and keep access up-to-date from onboarding to offboarding with custom approval chains, policies, and workflows.

Onboarding

Schedule provisioning, passkeys, and third party group access for new hires down to the minute.

Employee onboarding checklist showing completed tasks: app access, passkey setup, cybersecurity training, and device configuration.
Transitions

Use approval chains and workflows to automate updates to user permissions and group access.

Employee promotion interface showing completed steps: updating permissions, adding to GitHub/AWS groups, Slack channel, and email lists.
Offboarding

Coordinate with HR and other teams to suspend access, deprovision users, and schedule offboarding actions at the right time.

Offboarding checklist interface showing completed tasks including Google Drive transfer, app suspension, device retrieval, and cleaning.
Integrations

Level up your tech stack

Integrations don’t just keep your systems in sync. They unlock rich platform capabilities for greater control over your apps and users.

600+ pre-built third party applications
Custom SCIM integrations
Custom attribute mapping
End to end security

All the security tools you need—and then some

Cross-OS MDM
Built-in endpoint protection
Zero-touch deployment
Custom script deployment
Device encryption enforcement
Audit logs
OS updates
Remove locking & wiping
Device management
Assign and unassign devices to users

Quickly assign and unassign devices to any team member. Pick devices for a new employee during onboarding or manually make assignment changes at any time, right in Rippling.

Device configuration profiles

Easily apply custom settings such as WiFi profiles, firewall settings, printer mapping, custom login screens, background, and more. Because it's built on top of the Rippling Platform, all of these custom settings can be dynamically applied to individuals or groups based on any employee attribute (e.g. department, level, location, etc.)

Order new computers & accessories

Streamline ordering everything you need for a new hire directly into the onboarding process. Rippling is an authorized device reseller for Macs and PCs, meaning you can order and ship devices with just a few clicks. No more last minute trips to the local computer store and then FedEx.

Custom script deployment

Utilize bash (macOS) and Powershell (Windows) scripting to further customize your devices. Execute scripts on a one-time or recurring schedule and view or export script output.

Cloud RADIUS

Use Rippling's hosted RADIUS server to allow employees to log into the office WiFi or VPN with their Rippling credentials, further consolidating your authentication requirements.

Device encryption enforcement

Encrypt devices with Filevault (macOS) and Bitlocker (Windows 10/11 Pro). Access escrowed recovery keys right in Rippling on the device's profile.

Device management dashboards and reports

Build custom reports and turn them into dashboards to easily gain insight into your fleet of devices, their status, and any other specs you wish. No code needed.

Endpoint protection

Automatically install SentinelOne with just a few clicks and manage potential threats in the same system where you're already managing your devices.

OS updates

Track and enforce operating system updates for both Mac OS and Windows.

Password policies

Enforce custom password policies specifying minimum length, required character types, complexity, and frequency of password rotation.

Reassign devices

Reassign previously assigned devices, if needed. For example, reassign season employees the same computer they previously used.

Remote device locking and wiping

Instantly lock or wipe computers at any time, from anywhere in the world. Or, pre-schedule as a part of routine employee offboarding.

Rippling Agent for Macs (MacOS)

Remotely manage and secure your Apple computers with our homegrown MDM software, right alongside your PCs. All your computers in one place.

Rippling Agent for PCs (Windows)

Remotely manage and secure your Windows computers with our homegrown MDM software, right alongside your Macs. All your computers in one place.

Role-based software installation

Automatically install the software your employees need based on their job—like department, level, or location—so they have everything they need on day one.

Silent agent install & zero touch deployment

Hands-free MDM deployment lets you enroll your company devices in Rippling's MDM without any user interaction.

Identity & access
App integrations

Rippling has over 600 integrations with other SaaS products for user provisioning and deprovisioning, Single Sign On, attribute syncing, and more.

Custom app integrations

Build custom integrations to provide SSO with SAML, provisioning with JIT or SCIM, or create and scope URL links that employees can access from the Single Sign on bar in Rippling.

Data attribute mapping

Extend Rippling's user directory (object graph) downstream to all your 3rd party applications, keeping your employee data up to date across all systems, in real time.

MFA enforcement

Create bespoke authentication policies for groups of employees, or even individual employees, based on their role. For example, you can require YubiKeys for Admins and TOTP for everyone else. It's fully customizable and it's entirely your choice.

Google license management

Rippling is a reseller for Google, allowing you to manage and purchase licensing directly within Rippling for those applications. Never hit a roadblock because you are out of licenses when creating a new user.

Google offboarding actions

Advanced functionality that automates the painful parts of offboarding an employee, deprovisioning their Google Account, and transferring ownership. Reassign Google Drive files, transfer ownership of Calendar events, provide access to exiting employees' Gmail, remove app specific passwords and recovery info, and more.

Password Management

RPass is Rippling's natively-built password manager. RPass makes it easy to securely store and share passwords among your team thanks to Supergroups, Rippling's ability to build groups of employees based on any attribute. Prefer to use a different password manager? Not a problem—Rippling integrates with the tool that works best for you.

Role-based access controls

Everything in Rippling from app access to admin access is based on the employee's role. Give everyone everything they need, and nothing they don't.

SSH key manager

Manage and organize key access for individuals and groups based on any employee attribute. Automatically revoke access during key moments in the employee lifecycle, such as a role change or termination.

SSO

One-click sign-in and authentication to all connected third party applications once signed in to Rippling.

User Provisioning

Automatically create or suspend users' access to applications and licenses based on predefined rules that you create. Provisioning can be done instantaneously, or be pre-scheduled to occur at a future date and time.

Virtual LDAP

Seamlessly pull user data from Rippling into your legacy third party applications and network hardware, such as firewall, NAS, and more.

Group management

Ensure employees have access to the right groups and resources within other applications and systems. From Google Groups to Slack Channels to Microsoft licenses, Rippling automates the assignment of your team members into all of the relevant groups within your systems and tools. Powered by Supergroups, any employee attribute can be used to provision (and deprovision) access. When an employee transitions roles or leaves the company, their group membership is instantly updated to ensure you stay compliant.

Inventory management
Device shipping

Ship new devices, fully configured to your employees with just a click, whether it's for a new hire or a team member who lost or damaged a device. As an authorized reseller, you can buy new devices right in Rippling. Because it's built on top of the same shared source of truth, Rippling automatically pulls in the employee's shipping address while keeping their personal information hidden from anyone who shouldn't have access to it.

Device storage

Rippling can securely warehouse your unused devices. All devices are put through a 10-point inspection, wiped, and physically cleaned. With secure device warehousing available in the US and 26+ other countries, it's the safer and more secure alternative to the IT closet down the hall.

Device retrieval

Automatically ship a padded box and prepaid label for outgoing employees to return their devices, saving you a trip to the UPS Store.

FAQs

What is identity and access management software?

Identity and access management software centralizes the management of user identities and their access to various systems and applications. It ensures that the right people have the right access at the right time.

IAM software can be deployed on-premises, in the cloud, or hybrid environments.

How do I choose the right IAM solution?

When choosing an identity access management solution, consider key factors like:

  • Integration: Look for a platform that seamlessly integrates with your existing HR, IT, and application ecosystem.
  • Automation: Prioritize solutions that automate user lifecycle management, from onboarding to offboarding. Rippling automates provisioning, deprovisioning, and access updates based on HR data.
  • Security: Ensure the solution offers strong security features like multi-factor authentication, role-based access control, and behavioral detection.
  • Scalability: Choose a solution that can grow with your organization. Rippling's platform is designed to scale with businesses of all sizes.
  • User experience: Look for a self-service platform that makes it easy and intuitive for all team members to use.

Why do organizations need an identity and access management solution?

Organizations need IAM solutions to optimize security by controlling access to sensitive data and applications, streamline user lifecycle management, improve regulatory compliance, minimize the risk of data breaches, and centralize management of workforce identities.

What is least privilege access?

Least privilege access is a security principle that grants users only the minimum level of access they need to perform their job functions. Rippling helps enforce least privilege by allowing you to define granular access controls based on roles, departments, and other attributes.

What Is Zero Trust?

Zero Trust is an identity security model that assumes no user or device should be trusted by default, regardless of their location or network. This improves your organization’s security posture by ensuring that every access request is verified and authorized, regardless of where it originates.

Manage your devices with Rippling