Generic Connector


  • Integration of systems and applications in tenfold without a standard plugin.

  • REST client contained in GC implements client’s REST API, described in YAML.

  • Integration with third-party systems is made possible through implementation of the appropriate REST server which the GC can connect to in tenfold. The supported commands (e.g. “Create user”/”Remove permission”) are sent via this connection.

  • The REST server then implements these commands for the third-party system using the provided API (e.g. SOAP, REST, SQL or a proprietary API).

  • The REST server acts as broker between tenfold and third-party systems (server programming language irrelevant).

  • The REST-API supports all of tenfold’s user and permission functions.

Required License

Related Links

Create server for different programming languages

  • Automation: tenfold relays modifications made to users and access rights automatically, thereby eliminating manual tasks and thus saving valuable time.

  • Reporting: Keep track of who has which access rights. More information about reporting with tenfold.

  • Profiles/roles: Roles and policies can be grouped together with resources and access rights from other target systems and then linked to organizational units. This way, roles and policies are assigned to users automatically and removed when required, e.g. when someone moves to another department. Learn more about roles in tenfold.

  • Approval workflows: Both single-stage and multi-stage workflows supported. Easy configuration of escalations and substitutes.

  • Recertification: Data owners can review access rights regularly to ensure they are up-to-date and mark obsolete permissions for removal. tenfold then removes these entries automatically. Learn more about recertification with tenfold.

  • Auditing: Changes made to access rights are documented automatically. You can access historical data at any time and track who had access to sensitive data.  Learn more about change tracking.

  • Integration of data owners: Appoint data owners who are responsible for approving or rejecting requests and who must review certain access rights on a regular basis. Learn more about data owners in tenfold.

Want to learn more?

Our video demo covers the full range of features
included in our powerful IAM solution.

View Demo

Want to learn more?

Our video demo covers the full range of features
included in our powerful IAM solution.

View Demo

Visit our blog for more tips & tricks on cyber security!