Need-to-know visibility
Every user sees only the objects they're directly connected to β as owner, manager, doer, or group member. Sensitive security data stays in the hands of the people responsible for it, not visible to everyone who has a login.
Roles that map to real responsibility
Admin, owner, manager, and doer are not arbitrary access tiers β each has a distinct set of capabilities. Admins configure the platform. Owners carry accountability. Managers coordinate and review. Doers complete the work. The role defines what you can do, not just what you can see.
User groups
Group users together and assign the group as task doers or managers. Every group member gains the same scoped visibility into connected items. Ownership always stays personal β groups can manage and execute, but only individuals can own.
SSO with any provider
Connect Kordon to Google Workspace, Microsoft Entra ID, Okta, Keycloak, or any OIDC-compliant identity provider. SSO is built directly into Kordon β no separate authentication layer, no extra infrastructure to maintain.
SCIM user federation
Provision and sync users and groups automatically from your identity provider using SCIM 2.0. Supported with Microsoft Entra ID (Azure AD), Okta, OneLogin, Google Workspace, and any SCIM 2.0βcompliant provider.
Full audit trail
Every change, every assignment, every task completion is logged with a timestamp and the responsible user. Access changes and structural decisions are fully traceable β exactly what internal auditors and certification bodies expect to see.