🔥 Agentic Identity Governance Introduced at RSAC 2026. See the announcement →
FAQs

Frequently Asked Questions

General & Core Capabilities

What is BalkanID, and how does it differ from traditional IGA (Identity Governance and Administration) solutions?

BalkanID is a modern identity security and governance platform that provides continuous visibility into identities, access, and risk across cloud, SaaS, and on-prem environments. Unlike traditional IGA tools that focus mainly on periodic compliance reviews, BalkanID emphasizes real-time discovery, risk detection, and automated governance.

What are the core missions and goals of the BalkanID platform?

BalkanID aims to help organizations understand and control identity access across all systems. Its core goals are improving identity visibility, reducing identity-related security risk, automating governance processes, and enabling continuous access oversight.

How does BalkanID help organizations move toward a Zero Trust security model?

BalkanID supports Zero Trust by continuously monitoring access, enforcing least-privilege policies, identifying excessive permissions, and enabling time-bound or purpose-based access governance.

What are the primary business outcomes customers can expect after implementing BalkanID?

Customers typically gain better visibility into identity access, reduced security risk from excessive privileges, faster compliance readiness, and more efficient governance operations through automation.

How does BalkanID address the “Identity Sprawl” common in modern enterprise environments?

BalkanID discovers identities, accounts, and permissions across enterprise systems and maps them into a unified identity graph. This allows organizations to identify redundant identities, unused accounts, and unnecessary permissions.

In what ways does BalkanID improve employee productivity while maintaining strict security?

The platform simplifies governance tasks through automation, prioritized reviews, and intuitive interfaces, allowing employees and administrators to manage access efficiently without weakening security controls.

How does the platform reduce the operational “drag” typically associated with IT and security teams?

BalkanID reduces manual work by automating identity discovery, access reviews, and remediation workflows. Security teams spend less time managing spreadsheets and more time addressing real risks.

Can BalkanID operate as a standalone solution, or must it be integrated with an existing IGA provider?

BalkanID can operate as a standalone governance platform or complement existing IAM or IGA systems to provide enhanced visibility and modern automation capabilities.

What is the “Identity Graph,” and how does it serve as the foundation for the platform?

The Identity Graph models relationships between identities, accounts, roles, permissions, and applications. This structure enables deeper analysis of access relationships and identity risks.

How does BalkanID utilize Large Language Models (LLMs) and RAG (Retrieval-Augmented Generation)?

BalkanID uses LLMs with Retrieval-Augmented Generation to enable natural language interaction with identity data while retrieving accurate context from the Access Knowledge Graph.

What is the BalkanID Copilot, and how does it assist identity analysts?

The BalkanID Copilot is an AI assistant that helps analysts explore identity data, investigate access relationships, and quickly identify potential identity risks.

How does the natural language interface simplify tasks for non-technical users?

Users can ask questions about identities, permissions, or risks using plain language instead of complex queries, making identity analysis more accessible.

What is the “Access Knowledge Graph,” and how does it differ from a standard database?

The Access Knowledge Graph connects identity relationships, permissions, and contextual signals in a graph structure, enabling deeper analysis than traditional tabular databases.

How does BalkanID’s “headless” platform approach benefit organizations with existing automation stacks?

The headless architecture allows BalkanID to integrate with existing systems through APIs, enabling organizations to embed identity governance capabilities into their existing workflows.

What role does “Graph Intelligence” play in uncovering hidden identity risks?

Graph intelligence analyzes relationships between identities and permissions to reveal indirect access paths, privilege escalation opportunities, and policy violations.

How does BalkanID provide continuous visibility into identity risks across cloud and on-prem environments?

BalkanID continuously collects identity and permission data from connected systems and analyzes it to detect risks, ensuring organizations maintain an up-to-date view of access across environments.

What is “Actionable IAM Risk Detection,” and what types of risks does it surface?

Actionable IAM Risk Detection identifies identity risks and provides guidance for remediation. Examples include orphaned accounts, excessive privileges, dormant accounts, and toxic permission combinations.

How does the platform handle the governance of Non-Human Identities (NHIs) like service accounts and API keys?

BalkanID discovers and tracks machine identities such as service accounts and API tokens, allowing organizations to review, monitor, and govern their access privileges.

What capabilities does BalkanID have for governing “Disconnected Applications” that lack APIs?

BalkanID supports governance for disconnected systems through browser automation, workflow-based reviews, and imported access data when direct integrations are unavailable.

How does the platform detect and remediate Segregation of Duties (SoD) violations?

The platform analyzes permissions against defined SoD policies and flags conflicts. Review workflows and remediation actions help resolve these violations.

What is the “Priority Inbox,” and how does it help reduce reviewer fatigue?

The Priority Inbox highlights high-risk access items first, helping reviewers focus on the most critical decisions instead of reviewing all permissions equally.

How does the platform identify and manage “Zombie” or dormant accounts?

BalkanID analyzes activity and usage patterns to identify inactive accounts that still retain access privileges and flags them for review or remediation.

What are “Autopilot Playbooks,” and how can they be used to automate response actions?

Autopilot Playbooks are automation workflows that respond to identity events or risks, such as disabling dormant accounts, revoking excessive permissions, or triggering review campaigns.

Which major compliance frameworks (e.g., SOC 2, SOX, HIPAA) are supported by BalkanID?

BalkanID supports governance workflows aligned with frameworks such as SOC 2, SOX, HIPAA, ISO 27001, and PCI DSS.

How does the platform transform audit preparation from a “fire drill” into a state of continuous readiness?

BalkanID continuously collects governance evidence such as review decisions and remediation actions, ensuring audit documentation is always available.

How many pre-built connectors does BalkanID offer for SaaS, cloud, and HRIS systems?

BalkanID integrates with a wide range of SaaS applications, cloud platforms, directories, and HR systems through built-in connectors and extensible integration frameworks.

Can BalkanID integrate with ITSM tools like Jira and ServiceNow for remediation workflows?

Yes. BalkanID can integrate with ITSM platforms such as Jira and ServiceNow to track remediation actions and approval workflows.

How does BalkanID support hybrid environments that include both modern cloud apps and legacy on-prem systems?

BalkanID is designed for hybrid environments and can govern identities and access across cloud services, SaaS platforms, and legacy enterprise systems.

What type of “Auditor-Ready” reporting can be generated from the platform?

The platform can generate reports such as access review outcomes, identity risk findings, and user access summaries to support compliance audits.

Does the platform support Single Sign-On (SSO) for secure administrative access?

Yes. BalkanID supports integration with enterprise identity providers to enable secure SSO for administrative access.

IAM Risk & RBAC Analysis

What specific types of IAM risks does BalkanID automatically detect across the identity stack?

BalkanID detects risks such as excessive privileges, dormant or zombie accounts, orphaned identities, Segregation of Duties violations, over-permissive roles, unused permissions, and weak authentication configurations.

How does the platform identify and define a “Zombie” or dormant identity?

BalkanID analyzes login activity and usage patterns across systems to identify accounts that remain active but show little or no recent activity.

What constitutes a Segregation of Duties (SoD) violation within the BalkanID engine?

An SoD violation occurs when a single identity holds conflicting permissions that allow them to perform multiple sensitive actions that should be separated.

How does BalkanID detect excessive or “standing” privileges that exceed a user’s actual needs?

The platform compares assigned permissions with observed usage patterns and highlights privileges that are rarely or never used.

How are MFA gaps and weak authentication postures identified across different IdPs?

BalkanID analyzes identity provider configurations and flags accounts that lack required authentication controls such as multi-factor authentication.

What is the process for discovering orphaned service accounts or integration identities?

During identity discovery, BalkanID identifies service accounts without clear ownership or associated human identities and flags them for governance review.

How does the platform surface “wildcard” policies and over-permissive cloud roles?

BalkanID analyzes cloud IAM policies and identifies permissions that allow unrestricted access across services or resources.

How are individual findings risk-scored and tied to potential business impact?

Findings are evaluated based on factors such as privilege sensitivity, access scope, and potential system impact to prioritize high-risk issues.

How does BalkanID analyze the “Current State” of an organization’s RBAC model?

The platform analyzes role definitions, permission assignments, and user access patterns to understand how roles are currently structured and used.

What data points are used to identify “bloated” roles and unused permissions?

BalkanID evaluates permission usage data, role membership patterns, and privilege sensitivity to detect roles containing unnecessary access.

How does the platform generate recommendations for an “Ideal State” RBAC structure?

By analyzing usage patterns and identity relationships, BalkanID suggests simplified role structures aligned with least-privilege principles.

What is “Usage-based RBAC Access Insight,” and how does it prevent role sprawl?

Usage-based insights compare assigned permissions with actual activity, helping organizations remove unused privileges and prevent role expansion over time.

How does BalkanID help organizations modernize RBAC without requiring a full IAM re-architecture?

The platform provides visibility and recommendations that allow incremental improvements to role structures without replacing existing IAM systems.

What are “Role Merges,” and when does the system recommend them?

Role merges are recommendations to consolidate roles with overlapping permissions in order to simplify role management and reduce redundancy.

How does the system detect “RBAC Drift” over time?

BalkanID continuously compares actual permission assignments with defined role models to detect when roles diverge from their intended structure.

How does the platform utilize peer group analysis to identify access outliers?

The platform compares users within similar departments, roles, or teams to identify identities with unusually high or unusual privileges.

What is the “Access Knowledge Graph,” and how does it map relationships between identities and entitlements?

The Access Knowledge Graph connects identities, accounts, roles, and permissions in a graph structure, enabling deeper analysis of access relationships.

How can users tune “Insight Thresholds” (e.g., changing idle days from 90 to 180)?

Administrators can adjust policy thresholds within the platform to align detection rules with organizational governance policies.

How does the “Extendable Rule Engine” allow for the creation of custom security checks?

The rule engine allows organizations to define custom conditions and policies that trigger risk findings based on their specific security requirements.

Can compliance controls be enabled or disabled at the specific tenant or integration level?

Yes. Compliance rules and governance checks can be configured at the tenant or integration level to match organizational policies.

How does the platform incorporate HRIS metadata (department, job title) into its risk scoring?

BalkanID uses HR attributes such as department and role to compare identity access patterns and identify deviations from expected access levels.

What is “Permissive Power Evaluation,” and how does it rank the sensitivity of specific privileges?

Permissive Power Evaluation analyzes permissions and ranks them based on their potential impact on sensitive systems or data.

How does BalkanID calculate “User Trust Levels” for identity analysis?

User trust levels are derived from identity attributes, access history, and privilege sensitivity to provide context during risk analysis.

What are the specific metrics behind the “Role Relevance Score” and “Confidence Score”?

These scores reflect how closely role permissions align with actual usage patterns and the system’s confidence in recommended role optimizations.

What type of “Context-Aware Remediation Guidance” is provided for each risk finding?

Each finding includes recommended actions such as removing permissions, adjusting roles, or triggering governance reviews.

How do “Global Filters” help security teams prioritize findings by severity or framework?

Global filters allow teams to sort and prioritize risks based on severity levels, compliance frameworks, or affected systems.

How does the platform alert teams to “Toxic Combinations” of permissions in real-time?

BalkanID continuously evaluates access relationships and flags conflicts when identities acquire combinations of permissions that violate defined policies.

What is the difference between “Lite Analyzer” and “Enterprise Analyzer” in terms of RBAC insights?

Lite Analyzer provides baseline visibility into roles and permissions, while Enterprise Analyzer delivers deeper analytics, advanced insights, and optimization recommendations.

How does BalkanID facilitate “Impact Analysis” before a suggested role change is implemented?

The platform simulates proposed role changes to show how permissions and users would be affected before changes are applied.

How can IAM risk findings be automatically exported or pushed to ITSM tools like Jira or ServiceNow?

BalkanID integrates with ITSM platforms to automatically create tickets or workflow tasks for remediation actions.

Lifecycle Management & JIT Access

Onboarding & Offboarding (Joiners & Leavers)

How does BalkanID automate the “Day 1” provisioning process for new hires?

BalkanID integrates with HR systems to detect new employee records and automatically provisions access to required applications based on predefined lifecycle policies.

Which HRIS platforms (e.g., Workday, BambooHR) act as the “source of truth” for triggering lifecycle events?

HR systems such as Workday, BambooHR, and other supported HRIS platforms can act as authoritative identity sources that trigger lifecycle events.

How does the platform ensure that Leavers are fully de-provisioned across cloud, SaaS, and on-prem systems simultaneously?

When an employee departure is detected, BalkanID automatically initiates deprovisioning workflows across connected systems to revoke access and disable associated accounts.

Can BalkanID handle “soft-delete” versus permanent account deletion during offboarding?

Yes. Offboarding policies can be configured to disable accounts temporarily or permanently delete them based on organizational requirements.

What is the typical reduction in IT ticket volume after automating Joiner/Leaver workflows?

Organizations typically see significant reductions in manual access requests and IT tickets as provisioning and deprovisioning tasks become automated.

How does the system manage “Birthright” access based on a new hire’s department or job title?

Birthright access policies assign default application access automatically based on HR attributes such as department, job role, or location.

How are “Orphaned Accounts” (active accounts with no associated HR record) identified and remediated?

BalkanID compares HR records with discovered accounts and flags accounts without valid identity ownership for review or remediation.

Can the platform automate the transfer of data ownership or resources when an employee leaves?

Yes. Lifecycle workflows can trigger processes to reassign ownership of applications, files, or resources when a user leaves the organization.

What specific triggers in the HRIS signal a “Mover” event (e.g., job title change, department transfer)?

Mover events are typically triggered by HR attribute changes such as department transfers, job title updates, or manager changes.

How does BalkanID prevent “Privilege Creep” when an employee changes roles?

The platform analyzes existing permissions during role transitions and removes outdated access while assigning new privileges aligned with the updated role.

Are previous permissions automatically revoked, or is a delta access review triggered for Movers?

Organizations can configure the system to automatically remove outdated permissions or trigger targeted access reviews for validation.

How does the system recalculate Least Privilege access for a user moving into a cross-functional role?

BalkanID analyzes peer access patterns and role policies to determine the minimum privileges required for the user’s new responsibilities.

What is the definition of JITPBAC, and how does it differ from traditional JIT?

JITPBAC (Just-in-Time Purpose-Based Access Control) grants temporary access for a specific business purpose and automatically revokes it when the task is completed.

How are “Business Purposes” defined and enforced within a JIT request?

Access requests include a defined business justification, which is validated through approval workflows and enforced through time-bound access controls.

What are the default “Time-Bound” limits for temporary elevated access in the platform?

Organizations can configure time limits for temporary access, typically ranging from minutes to hours depending on policy requirements.

How does BalkanID handle the automatic revocation of JIT access once a task is completed?

JIT access privileges are automatically revoked when the approved time window expires or when the associated task is completed.

Can users request JIT access directly through Slack or Microsoft Teams?

Yes. The platform can integrate with collaboration tools to allow users to initiate access requests through familiar interfaces.

Does the system support “Emergency” or “Break-glass” JIT access for critical infrastructure?

Yes. Emergency access workflows can be configured to grant temporary elevated access during critical incidents while maintaining full audit logging.

How does JITPBAC minimize the “Window of Opportunity” for attackers using compromised credentials?

By granting elevated privileges only for short periods and revoking them automatically, JITPBAC significantly reduces the time attackers can exploit compromised accounts.

What is the difference between “Single-Step” and “Multi-Tier” approval workflows in the Lifecycle module?

Single-step workflows require one approver, while multi-tier workflows require approvals from multiple stakeholders before access is granted.

How do “Smart Forms” reduce manual data entry for employees requesting new access?

AnswerSmart forms automatically populate relevant identity information and suggest appropriate access options based on user attributes.

What contextual insights (e.g., peer access, risk scores) are provided to an approver?

Approvers can view contextual information such as peer access patterns, privilege sensitivity, and risk insights before making decisions.

Can approval chains be customized based on the sensitivity of the application (e.g., Finance vs. Engineering)?

Yes. Approval workflows can be configured to require different approvers depending on the application or access sensitivity.

How does the platform handle delegation if a primary approver is unavailable?

Delegation policies allow approval responsibilities to be reassigned temporarily to alternate approvers.

How are all lifecycle events—provisioning, JIT grants, and revocations—logged for SOC 2 or SOX audits?

BalkanID records detailed audit logs for all lifecycle events, including provisioning actions, approvals, and access revocations.

Does BalkanID support direct provisioning via SCIM 2.0 for modern SaaS apps?

Yes. The platform supports SCIM-based provisioning for compatible SaaS applications.

How does the “SCIM Proxy Bridge” extend lifecycle automation to non-SCIM legacy apps?

The SCIM Proxy Bridge translates provisioning actions into workflows that can manage access for systems that do not support SCIM natively.

What is the role of “Autopilot Playbooks” in scaling lifecycle operations for thousands of users?

Autopilot Playbooks automate lifecycle tasks such as provisioning, revocation, and access reviews, allowing organizations to manage identity governance at scale.

How does the platform ensure “Audit-Readiness” without manual spreadsheet collection?

All lifecycle actions and governance decisions are automatically logged, enabling organizations to generate audit evidence without manual tracking.

What are the key differences between the Lite and Enterprise versions of the Lifecycle module regarding JIT support?

The Lite version supports basic lifecycle automation, while the Enterprise version includes advanced capabilities such as JIT access workflows and deeper automation controls.

Advanced Features & Integrations

What is the “Access Knowledge Graph,” and how does it correlate identities with real-world business risk?

The Access Knowledge Graph maps relationships between identities, applications, roles, and permissions. By analyzing these relationships, BalkanID can identify how access privileges translate into potential operational or security risks.

How does the AI Copilot utilize Large Language Models (LLMs) to interpret natural language security queries?

The AI Copilot uses LLMs with contextual data from the Access Knowledge Graph to interpret natural language queries and return accurate identity insights and risk analysis.

Can the AI Copilot automatically generate remediation playbooks based on a plain-language request?

Yes. Administrators can request actions in plain language, and the Copilot can suggest or generate remediation workflows using automation playbooks.

How does the “Identity Graph” help in visualizing the blast radius of a potentially compromised account?

The Identity Graph shows how an identity connects to systems, permissions, and roles, allowing analysts to quickly understand what systems could be affected if an account is compromised.

What are “AI-Powered Operators,” and how do they differ from standard API-based connectors?

AI-powered operators interact with systems that lack traditional APIs by automating user interface actions or workflows, enabling governance of applications that cannot be integrated through standard connectors.

How does BalkanID ensure that sensitive data remains secure while using LLMs for data analysis?

The platform restricts LLM interactions to relevant metadata and controlled retrieval contexts, ensuring sensitive identity data remains protected.

Can the platform provide “Explainable AI” recommendations so reviewers understand why a revoke is suggested?

Yes. The platform provides contextual explanations for recommendations, including usage insights, risk signals, and policy violations.

How does BalkanID govern applications that do not have public APIs or SCIM support?

BalkanID supports governance for disconnected systems through automation, browser interaction, and workflow-based access reviews.

What is the role of the Chrome Extension in automating access reviews for SaaS products without APIs?

The Chrome extension allows administrators to interact with application interfaces and automate access review actions when APIs are unavailable.

How does “Windows App Control” enable governance for legacy desktop and thick-client applications?

Windows App Control allows BalkanID to enforce governance policies and monitor access activity for legacy applications that operate outside modern identity integrations.

What is “Headless Operator Mode,” and how does it mimic administrator actions for manual systems?

Headless Operator Mode automates tasks normally performed by administrators by simulating interactions with application interfaces or workflows.

How does the “SCIM Proxy Bridge” translate legacy provisioning into modern, automated workflows?

The SCIM Proxy Bridge converts lifecycle actions into workflows that allow provisioning and deprovisioning for systems without native SCIM support.

Can BalkanID ingest entitlement data via flat files or manual exports for air-gapped environments?

Yes. The platform can ingest identity and entitlement data through file imports or manual data exports when direct integrations are not possible.

How does BalkanID discover and inventory Non-Human Identities (NHIs) like API keys and OAuth tokens?

During discovery, BalkanID identifies service accounts, tokens, and automation identities across integrated systems and maps them into the identity graph.

What metadata is used to auto-suggest “Human Sponsors” or owners for unowned service accounts?

The platform analyzes attributes such as application ownership, activity patterns, and associated teams to recommend responsible owners.

How does the IAM Risk Analyzer detect over-privileged service principals in cloud environments?

The platform evaluates service principal permissions against usage patterns and privilege sensitivity to identify excessive privileges.

Can BalkanID enforce rotation policies for API keys and secrets stored in vaults?

BalkanID can integrate with secret management platforms and enforce governance policies related to credential lifecycle and rotation practices.

How are AI Agents governed when they begin acting on behalf of human users within the enterprise?

AI agents are treated as non-human identities, allowing their permissions and activity to be monitored, reviewed, and governed through the same identity policies.

How does BalkanID integrate with existing IGA platforms like SailPoint or Saviynt to accelerate their time-to-value?

BalkanID can complement existing IGA platforms by providing enhanced discovery, analytics, and automation while leveraging their provisioning capabilities.

What is the “Headless Platform Approach,” and how does it allow BalkanID to run as an invisible automation layer?

The headless architecture exposes platform capabilities through APIs, allowing organizations to integrate governance workflows into existing systems without changing user interfaces.

How can BalkanID playbooks be triggered from external ITSM tools like ServiceNow or Jira?

External systems can trigger playbooks through API integrations, allowing remediation workflows to be initiated directly from ticketing platforms.

Does the platform support integration with Secrets Managers like HashiCorp Vault or Azure Key Vault?

Yes. BalkanID can integrate with secret management tools to monitor and govern machine credentials and access policies.

How does BalkanID correlate identity data with security signals from SIEMs or CNAPP tools (e.g., Wiz, Splunk)?

The platform can ingest and correlate security signals with identity context to improve risk analysis and incident response workflows.

Is there a full REST API available for technical teams to build custom integrations or scripts?

Yes. BalkanID provides REST APIs that allow organizations to build custom integrations and automation scripts.

How does BalkanID support hybrid-cloud governance across AWS, Azure, and GCP simultaneously?

The platform discovers identities and permissions across multiple cloud environments and analyzes them through a unified identity graph.

What is the “Agentic Playbook Framework,” and how does it automate multi-step cross-platform tasks?

The Agentic Playbook Framework orchestrates automated workflows that execute governance actions across multiple systems in sequence.

Can the platform support “Migration Scaffolding” when moving from one IGA vendor to another?

Yes. BalkanID can assist organizations during IGA transitions by providing visibility and governance during migration phases.

How do “Custom Entity Reviews” allow organizations to govern non-standard resources (e.g., Slack channels or specific data tables)?

Custom entity reviews allow organizations to include additional resource types in governance workflows beyond traditional identities and roles.

Does the platform support custom branding or white-labeling for the Unified Access Request Portal?

Yes. Organizations can customize branding for the access request portal to align with internal identity workflows.

How can developers use the SDK to run BalkanID playbooks on their own local infrastructure?

Developers can use the SDK to integrate BalkanID automation workflows with internal systems and execute playbooks within their existing infrastructure.

BalkanID MCP

What is BalkanID MCP?

BalkanID MCP is a server that connects your AI assistant (such as Claude) directly to the BalkanID identity governance platform. It lets you query identities, action access reviews, manage entitlements, and enforce governance policies using plain conversational language.

What AI assistants does BalkanID MCP work with?

Any AI assistant that supports the Model Context Protocol (MCP), including but not limited to Claude Desktop, VS Code, Cursor, custom-built agents, and programmatic MCP clients. The same BalkanID credentials work across all of them.

What can I actually do through the MCP?

You can:

  • Discover identities, service accounts, and credentials across all connected applications
  • Find terminated employees with active access or orphaned accounts with no owner
  • See expired or expiring credentials and flag them for remediation
  • View, approve, deny, and delegate access review campaigns
  • Submit and track access requests for yourself or colleagues
  • Detect Separation of Duties violations across all integrations
  • Create governance constraints that activate immediately
  • Onboard employees and trigger integration syncs
What is the difference between read and write permissions?

Read permission lets you query and view data — identities, campaigns, credentials, requests, constraints. Write permission is required to take action — approving reviews, creating constraints, submitting access requests, delegating campaigns, and triggering syncs. You can issue a read-only API key for monitoring use cases and a write-scoped key for full workflow automation.

Which applications and integrations does it cover?

BalkanID MCP works across every application connected to your BalkanID tenant — including but not limited to Azure, AWS, Okta, Active Directory, Google Cloud, Salesforce, Slack, GitHub, Custom Apps, and more. Any integration visible in your BalkanID dashboard is accessible through the MCP.

Where can I learn more about MCP itself?

See the official Model Context Protocol documentation at modelcontextprotocol.io/docs/getting-started/intro for a plain-language introduction to how the protocol works.

Pricing & Implementation

What is the starting annual price for the BalkanID Lite modules?

BalkanID Lite modules typically start around $10,000 per year and provide essential capabilities such as user access reviews and IAM risk insights.

How does the pricing scale for the Enterprise tier compared to the Lite tier?

Enterprise deployments typically start around $25,000 per year and scale based on the number of users, applications, and advanced capabilities such as lifecycle automation and AI-driven governance.

What defines a “User” for pricing purposes (e.g., active employees, contractors, or non-human identities)?

A user generally refers to an active human identity, including employees and contractors. Non-human identities such as service accounts can be governed without always counting toward licensed users.

Are there any additional costs for adding more application integrations beyond the initial setup?

Most standard integrations are included. Custom integrations or specialized automation workflows may require additional configuration depending on complexity.

What is the “additional price per user” once the default user limit is exceeded?

Pricing scales on a per-user tier basis, allowing organizations to expand coverage as their workforce grows.

Is there a discount available for organizations with a high volume of users (e.g., 10k+ users)?

Yes. Volume pricing tiers are typically available for large enterprises with higher user counts.

How is the “Lite Lifecycle Management” module priced as an add-on to the UAR module?

Lifecycle automation can be added as a module on top of the core governance platform and is priced based on the number of users under lifecycle management.

Are there separate costs for the AI Copilot and Identity Graph features, or are they included in the platform price?

The Access Knowledge Graph and AI Copilot capabilities are included within the platform as part of the intelligence layer.

Does BalkanID offer a “Pay-As-You-Go” or modular pricing model for specific compliance needs?

Yes. BalkanID follows a modular pricing model, allowing organizations to adopt capabilities such as UAR, IAM risk analysis, or lifecycle management independently.

Is there a free trial or a Proof of Value (PoV) period available for new customers?

Most enterprise deployments begin with a Proof of Value engagement to validate integrations, risk insights, and governance workflows.

What is the typical “Time-to-Value” for a standard BalkanID implementation?

Organizations typically begin seeing value within days or weeks after connecting identity sources and applications.

Are professional services or external consultants required to deploy the platform?

No. The platform is designed for rapid deployment, though onboarding support is available for complex environments.

How long does it take to connect a major Identity Provider like Okta or Microsoft Entra?

Connecting major identity providers usually takes a short configuration process once the required credentials and permissions are available.

What are the prerequisites (e.g., service accounts, API keys) required from the customer before starting implementation?

Customers typically provide read-only API credentials or service accounts for identity providers, SaaS applications, and cloud platforms.

How does BalkanID handle “One-Click Integrations” for major SaaS and Cloud providers?

Pre-built connectors allow administrators to connect systems through guided configuration workflows.

Can the platform be deployed in a “Headless” or API-only mode to fit into existing workflows?

Yes. BalkanID supports an API-first architecture that allows organizations to integrate platform capabilities into existing workflows and automation pipelines.

What is the process for onboarding custom or “Disconnected” applications that don’t have native connectors?

Disconnected systems can be onboarded using browser automation, file imports, or AI-powered operators that replicate administrative actions.

Does BalkanID provide a dedicated implementation manager during the initial setup phase?

Enterprise deployments typically include onboarding support and guidance to ensure a smooth rollout.

How much technical effort is required from the customer’s engineering or DevOps teams during setup?

Minimal effort is typically required. Most integrations involve configuration rather than custom development.

Can BalkanID be deployed on-premises, or is it exclusively a cloud-native SaaS solution?

BalkanID can be deployed as a hosted SaaS platform or within a customer-controlled cloud or data center environment depending on security requirements.

What level of ongoing technical support is included in the annual subscription?

Customers receive ongoing technical support, platform guidance, and access to documentation.

How are software updates and new feature releases handled for customers?

Updates and new capabilities are delivered continuously through the platform without requiring manual upgrades.

Does BalkanID offer a Service Level Agreement (SLA) regarding platform uptime and response times?

Enterprise deployments typically include defined service level agreements covering platform availability and response times.

Is there a dedicated “Customer Success” resource for Enterprise-tier clients?

Enterprise customers typically receive customer success support to help ensure successful adoption and ongoing value.

How does BalkanID ensure the security and privacy of the identity data it ingests?

The platform follows enterprise security practices to ensure identity data is securely processed and protected.

Does the platform store sensitive “Secret Values” (like passwords or API keys) during its governance process?

No. BalkanID focuses on governance metadata and access relationships rather than storing sensitive credential values.

Where is the BalkanID platform hosted, and what data residency options are available?

The platform can run in secure cloud environments or customer-controlled infrastructure depending on compliance requirements.

How often are the automated “RBAC Analysis” and “Risk Assessments” refreshed in the Lite vs. Enterprise versions?

Lite deployments perform periodic analysis while enterprise deployments support more frequent or continuous identity risk monitoring.

What type of training or documentation is provided to enable “Self-Service” administration?

Customers have access to product documentation, integration guides, and operational playbooks to support self-service administration.

Can BalkanID help with the migration of data and policies from a legacy IGA system?

Yes. BalkanID can assist organizations transitioning from legacy IGA platforms by providing visibility, discovery, and governance during the migration process.

UAR

How does BalkanID automate the launch of quarterly and annual access review campaigns?

Administrators can define campaign templates and schedules so user access review campaigns launch automatically at the required cadence, such as quarterly or annually.

What is the difference between an “Application-Wide” review and a “Targeted” review?

Application-wide reviews evaluate access for all users within an application, while targeted reviews focus on specific roles, entitlements, or identity groups.

How does the platform ingest data from over 300+ SaaS applications for a single review cycle?

BalkanID connects to SaaS, cloud, and identity systems through integrations and collects user, role, and entitlement data used to generate review campaigns.

Can BalkanID sync with HRIS systems to ensure employee attributes are up-to-date during a review?

Yes. HRIS integrations ensure employee attributes such as department, manager, and role remain current during review cycles.

What is “Continuous Sync,” and how does it benefit Enterprise UAR customers?

Continuous sync keeps identity and access data refreshed automatically so reviews reflect the most recent permissions and role assignments.

How does the platform handle “On-Demand” syncing for Lite UAR users?

Lite users can trigger a manual synchronization to refresh application and identity data before launching a review campaign.

Can review campaigns be scheduled to recur automatically (monthly, quarterly, annually)?

Yes. Campaigns can be configured to run automatically at predefined intervals.

How does “Version Tracking” work for recurring campaigns in the Enterprise tier?

Each campaign instance is tracked separately, allowing organizations to maintain a historical record of review decisions across cycles.

What is the “Priority Inbox,” and how does it help reviewers focus on high-risk access?

The Priority Inbox highlights access items with higher risk signals such as unused privileges, over-entitlements, or policy violations so reviewers can prioritize critical decisions.

How do “Contextual Insights” (e.g., peer access, last login) reduce “rubber-stamping” by reviewers?

Reviewers see contextual signals such as peer access comparisons, entitlement usage, and login activity to support more informed decisions.

Can reviewers see if an entitlement is “Unused” or “Stale” directly within the dashboard?

Yes. The review interface displays usage indicators that help reviewers quickly identify inactive or unnecessary permissions.

What are “AI-Driven Recommendations,” and how do they guide a reviewer’s decision to approve or revoke?

The platform analyzes usage patterns and access context to suggest whether access should be retained or revoked.

How does the platform facilitate “Delegation Support” if a reviewer is out of the office?

Review responsibilities can be reassigned or delegated so campaigns continue without delays.

What “Multi-Tier” approval workflows are supported (e.g., Manager → App Owner → Security)?

Organizations can configure approval chains involving managers, application owners, security teams, or other designated stakeholders.

How are “Deadline Reminders” sent to reviewers who have pending actions?

Automated reminders notify reviewers of pending tasks and approaching deadlines.

How does BalkanID certify access for “Non-Human Identities” (API keys, service accounts)?

Non-human identities can be included in campaigns and reviewed using the same governance workflows as human identities.

What specific “Cloud Infrastructure” roles (AWS, Azure, GCP) can be reviewed?

The platform supports review of roles, policies, and permissions across major cloud providers.

How are “Disconnected Applications” (those without APIs) included in UAR campaigns?

Disconnected applications can be governed through imported entitlement data, browser automation, or operator workflows.

Can the platform review “Custom Entities” beyond users and groups?

Yes. Organizations can extend governance to additional resource types such as application roles, shared resources, or data access objects.

What is the process for reviewing “Privileged” versus “Non-Privileged” users in an IdP?

Privileged identities can be flagged and prioritized so reviewers can focus on higher-risk access.

How does BalkanID generate “Auditor-Ready” reports with timestamps and decision evidence?

The platform records reviewer actions, timestamps, and justifications so organizations can produce audit-ready reports.

Can audit reports be customized using different templates for different stakeholders?

Yes. Reporting can be configured for security teams, compliance officers, and auditors.

How does the platform help organizations satisfy SOC 2, SOX, HIPAA, and ISO 27001 requirements?

BalkanID supports structured access reviews, audit evidence collection, and reporting required by common compliance frameworks.

What happens automatically when a reviewer marks an entitlement for “Revocation”?

Revocation decisions can trigger remediation workflows or generate tasks for administrators to remove the access.

Does BalkanID integrate with ticketing systems like Jira or ServiceNow for manual remediation tracking?

Yes. The platform can create tickets or workflow tasks in external systems to track remediation actions.

How are “Segregation of Duties” (SoD) violations flagged during a review?

The platform detects conflicting permissions and alerts reviewers when a combination violates defined SoD policies.

Is there a dashboard to track real-time campaign progress across the entire organization?

Yes. Administrators can monitor completion rates, pending reviews, and campaign progress from a centralized dashboard.

How does the platform document “Exceptional Approvals” or comments left by reviewers?

Reviewer comments and justifications are recorded alongside decisions to provide full audit traceability.

What are the key limitations of the Lite UAR module compared to Enterprise UAR?

Lite provides essential access review capabilities, while enterprise deployments include advanced automation, continuous data synchronization, and deeper governance analytics.

How many campaigns per quarter are allowed in the Lite tier per application?

Lite deployments support a limited number of campaigns per application each quarter, while enterprise deployments provide flexible scheduling and higher campaign capacity.