# Veza Documentation

## Platform overview

Veza's Access Graph integrates with cloud identity providers, cloud IAM, cloud services, apps, and data systems to discover authorization metadata, translating the complexity into a simple language of effective permissions.

Veza then provides insights into the relationships between entities such as identities, policies, roles, and resources, and enables users to create reports, queries, access reviews, and more using the latest data or a historical snapshot. Risk, compliance, security, and IT teams use Veza for visibility into which people and automated services can access sensitive data assets.

<div data-full-width="false"><figure><img src="/files/G2qLLXHaTHoNe4Btv4sG" alt=""><figcaption></figcaption></figure></div>

Veza answers the questions "Who has access to what," and "How do they have access?" With Veza, you'll pass your audits faster with less pain, be empowered to lock down data to only those who need it, and securely migrate cloud assets.

{% embed url="<https://youtu.be/4faJ0KNZMOE?si=XgE2g8XJnTPCscU5>" fullWidth="false" %}

## What's new

* [**Product updates**](/4yItIzMvkpAvMVFAamTf/product-updates/blog.md): Monthly highlights across Veza products
* [**Release notes**](/4yItIzMvkpAvMVFAamTf/release-notes/release-notes.md): Biweekly changelogs with version-specific features, enhancements, and fixes

## Product documentation

The documentation includes guides, reference material, and release updates for the Veza authorization platform. Use the information within to configure and administer Veza, and learn about core features.

<table data-view="cards" data-full-width="false"><thead><tr><th data-card-target data-type="content-ref"></th><th></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><a href="/pages/ITZBOoVKWD5xmbG22qlQ">/pages/ITZBOoVKWD5xmbG22qlQ</a></td><td>Ask questions about access in plain English. AI-powered risk detection, role intelligence, and review explainability across the Access Graph.</td><td><a href="/files/dw6SGWjoiMuj85DxQ55o">/files/dw6SGWjoiMuj85DxQ55o</a></td></tr><tr><td><a href="/pages/FA4za3UzK8V33POrdC0R">/pages/FA4za3UzK8V33POrdC0R</a></td><td>Explore identity-to-resource relationships using Graph Search and Query Builder. Trace effective permissions and save queries as security baselines.</td><td><a href="/files/LQh3DusBJIFFom799vWK">/files/LQh3DusBJIFFom799vWK</a></td></tr><tr><td><a href="/pages/WfuaGc6f4pbhhBBRcMD2">/pages/WfuaGc6f4pbhhBBRcMD2</a></td><td>Track and remediate access risks with dashboards, reports, saved queries, and alert rules. Monitor trends and enforce security baselines.</td><td><a href="/files/CSPhSOJeYuum76h851fn">/files/CSPhSOJeYuum76h851fn</a></td></tr><tr><td><a href="/pages/z0tK9vwzuF8c1P58cQAb">/pages/z0tK9vwzuF8c1P58cQAb</a></td><td>Run scalable access certification campaigns with collaborative review workflows, automated notifications, and immutable audit trails.</td><td><a href="/files/HV09YbSwMtf7j1AHVUys">/files/HV09YbSwMtf7j1AHVUys</a></td></tr><tr><td><a href="/pages/C9Rb3aIea356mcapiEDn">/pages/C9Rb3aIea356mcapiEDn</a></td><td>Self-service portal where employees view their permissions, managers oversee their teams, and reviewers complete certifications in one place.</td><td><a href="/files/5IC66k8IuggfyPHQX7Lh">/files/5IC66k8IuggfyPHQX7Lh</a></td></tr><tr><td><a href="/pages/u8f1sq6hIUM8RCQo9Ime">/pages/u8f1sq6hIUM8RCQo9Ime</a></td><td>Discover and govern service accounts, API keys, and automated systems. Track ownership, credential status, and privileged access across your infrastructure.</td><td><a href="/files/gzVXtkQn6dOfOoJsGssY">/files/gzVXtkQn6dOfOoJsGssY</a></td></tr><tr><td><a href="/pages/QkqBtymHyOaQR1FZYj2C">/pages/QkqBtymHyOaQR1FZYj2C</a></td><td>Automate onboarding, role changes, and offboarding with policy-driven provisioning. Sync entitlements across applications from a single source of truth.</td><td><a href="/files/4O0blWVDs9WwIwWG68bN">/files/4O0blWVDs9WwIwWG68bN</a></td></tr><tr><td><a href="/pages/6sYyyGTf7EMrzXhv6YlY">/pages/6sYyyGTf7EMrzXhv6YlY</a></td><td>Define and detect toxic access combinations that violate compliance policies. Investigate conflicts and trigger access reviews for remediation.</td><td><a href="/files/s1yduemPC1Hx9Z6VfTdT">/files/s1yduemPC1Hx9Z6VfTdT</a></td></tr><tr><td><a href="/pages/ZD3ixW7ceHb1Q0Yaj8Ck">/pages/ZD3ixW7ceHb1Q0Yaj8Ck</a></td><td>Analyze actual resource usage against granted permissions. Identify dormant access and over-provisioned identities using audit log data.</td><td><a href="/files/lsUZgGO2fM1Spw0zJire">/files/lsUZgGO2fM1Spw0zJire</a></td></tr><tr><td><a href="/pages/Kgsbvu67dQNk8E0Y51xw">/pages/Kgsbvu67dQNk8E0Y51xw</a></td><td>300+ connectors for cloud providers, identity systems, SaaS apps, databases, and on-prem platforms. Extend coverage with OAA or CSV upload.</td><td><a href="/files/QfMjIJebbcYu2NfemTtI">/files/QfMjIJebbcYu2NfemTtI</a></td></tr><tr><td><a href="/pages/qMRiC6MJBsnJeB6xTs52">/pages/qMRiC6MJBsnJeB6xTs52</a></td><td>Automate workflows, build custom integrations, and query the Access Graph programmatically. Includes OAA for onboarding unsupported applications.</td><td><a href="/files/vPBdSeRvBezkvXGT3DZA">/files/vPBdSeRvBezkvXGT3DZA</a></td></tr><tr><td><a href="/pages/acMWmtoFEDfPkHIZLxhz">/pages/acMWmtoFEDfPkHIZLxhz</a></td><td>Secure your tenant with SSO and MFA, manage users and roles, and monitor platform events and system settings.</td><td><a href="/files/cPSTHXTfvP05NX50LF8X">/files/cPSTHXTfvP05NX50LF8X</a></td></tr></tbody></table>

## Getting started

If you're new to the platform, you can learn about Veza features and recommended first steps on the [Getting Started](/4yItIzMvkpAvMVFAamTf/getting-started-with-veza.md) overview.

Depending on how much initial setup you have completed, you may need to integrate Veza with your identity, app, and data providers using the [Configuration](/4yItIzMvkpAvMVFAamTf/integrations/configuration.md) page.

After initial integration discovery to populate the data catalog, you can get immediate intelligence through [dashboards](/4yItIzMvkpAvMVFAamTf/features/insights/dashboards.md), [search](/4yItIzMvkpAvMVFAamTf/features/search.md) connections between entities, and begin defining your own [risks](/4yItIzMvkpAvMVFAamTf/features/insights/risks.md) and conditional [alerts](/4yItIzMvkpAvMVFAamTf/features/insights/rules-and-alerts.md).

## Getting help

We are committed to making our customers successful and rely on your feedback to drive product innovation. Please contact your Veza support representative with questions or requests. Please report any documentation issues or feedback to <docs@veza.com>.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.veza.com/4yItIzMvkpAvMVFAamTf/readme.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
