๐ Veza Documentation
Secure and understand your environment with Veza integrations and products.
Platform overview
Veza's Access Graph integrates with cloud identity providers, cloud IAM, cloud services, apps, and data systems to discover authorization metadata, translating the complexity into a simple language of effective permissions.
Veza then provides insights into the relationships between entities such as identities, policies, roles, and resources, and enables users to create reports, queries, access reviews, and more using the latest data or a historical snapshot. Risk, compliance, security, and IT teams use Veza for visibility into which people and automated services can access sensitive data assets.

Veza answers the questions "Who has access to what," and "How do they have access?" With Veza, you'll pass your audits faster with less pain, be empowered to lock down data to only those who need it, and securely migrate cloud assets.
What's new
Product updates: Monthly highlights across Veza products
Release notes: Biweekly changelogs with version-specific features, enhancements, and fixes
Product documentation
The documentation includes guides, reference material, and release updates for the Veza authorization platform. Use the information within to configure and administer Veza, and learn about core features.
Ask questions about access in plain English. AI-powered risk detection, role intelligence, and review explainability across the Access Graph.

Explore identity-to-resource relationships using Graph Search and Query Builder. Trace effective permissions and save queries as security baselines.

Track and remediate access risks with dashboards, reports, saved queries, and alert rules. Monitor trends and enforce security baselines.

Run scalable access certification campaigns with collaborative review workflows, automated notifications, and immutable audit trails.
Self-service portal where employees view their permissions, managers oversee their teams, and reviewers complete certifications in one place.
Discover and govern service accounts, API keys, and automated systems. Track ownership, credential status, and privileged access across your infrastructure.
Automate onboarding, role changes, and offboarding with policy-driven provisioning. Sync entitlements across applications from a single source of truth.
Define and detect toxic access combinations that violate compliance policies. Investigate conflicts and trigger access reviews for remediation.
Analyze actual resource usage against granted permissions. Identify dormant access and over-provisioned identities using audit log data.
300+ connectors for cloud providers, identity systems, SaaS apps, databases, and on-prem platforms. Extend coverage with OAA or CSV upload.
Automate workflows, build custom integrations, and query the Access Graph programmatically. Includes OAA for onboarding unsupported applications.
Secure your tenant with SSO and MFA, manage users and roles, and monitor platform events and system settings.
Getting started
If you're new to the platform, you can learn about Veza features and recommended first steps on the Getting Started overview.
Depending on how much initial setup you have completed, you may need to integrate Veza with your identity, app, and data providers using the Configuration page.
After initial integration discovery to populate the data catalog, you can get immediate intelligence through dashboards, search connections between entities, and begin defining your own risks and conditional alerts.
Getting help
We are committed to making our customers successful and rely on your feedback to drive product innovation. Please contact your Veza support representative with questions or requests. Please report any documentation issues or feedback to [email protected].
Last updated
Was this helpful?
