arrow-left

All pages
gitbookPowered by GitBook
1 of 1

Loading...

Veza Documentation

Secure and understand your environment with Veza integrations and products.

hashtag
Platform overview

Veza's Access Graph integrates with cloud identity providers, cloud IAM, cloud services, apps, and data systems to discover authorization metadata, translating the complexity into a simple language of effective permissions.

Veza then provides insights into the relationships between entities such as identities, policies, roles, and resources, and enables users to create reports, queries, access reviews, and more using the latest data or a historical snapshot. Risk, compliance, security, and IT teams use Veza for visibility into which people and automated services can access sensitive data assets.

Veza answers the questions "Who has access to what," and "How do they have access?" With Veza, you'll pass your audits faster with less pain, be empowered to lock down data to only those who need it, and securely migrate cloud assets.

hashtag
What's new

  • : Monthly highlights across Veza products

  • : Biweekly changelogs with version-specific features, enhancements, and fixes

hashtag
Product documentation

The documentation includes guides, reference material, and release updates for the Veza authorization platform. Use the information within to configure and administer Veza, and learn about core features.

hashtag
Getting started

If you're new to the platform, you can learn about Veza features and recommended first steps on the overview.

Depending on how much initial setup you have completed, you may need to integrate Veza with your identity, app, and data providers using the page.

After initial integration discovery to populate the data catalog, you can get immediate intelligence through , connections between entities, and begin defining your own and conditional .

hashtag
Getting help

We are committed to making our customers successful and rely on your feedback to drive product innovation. Please contact your Veza support representative with questions or requests. Please report any documentation issues or feedback to .

Product updates
Release notes
Getting Started
Configuration
dashboards
search
risks
alerts
[email protected]envelope
Cover
๐Ÿ”ฎAccess AI

Ask questions about access in plain English. AI-powered risk detection, role intelligence, and review explainability across the Access Graph.

Cover
๐Ÿ”ŽAccess Visibility

Explore identity-to-resource relationships using Graph Search and Query Builder. Trace effective permissions and save queries as security baselines.

Cover
๐Ÿ’กAccess Intelligence

Track and remediate access risks with dashboards, reports, saved queries, and alert rules. Monitor trends and enforce security baselines.

Cover
๐Ÿ”Access Reviews

Run scalable access certification campaigns with collaborative review workflows, automated notifications, and immutable audit trails.

Cover
๐Ÿ‘ฅAccess Hub

Self-service portal where employees view their permissions, managers oversee their teams, and reviewers complete certifications in one place.

Cover
๐Ÿ”‘NHI Security

Discover and govern service accounts, API keys, and automated systems. Track ownership, credential status, and privileged access across your infrastructure.

Cover
๐Ÿ”„Lifecycle Management

Automate onboarding, role changes, and offboarding with policy-driven provisioning. Sync entitlements across applications from a single source of truth.

Cover
โš–๏ธSeparation of Duties (SoD)

Define and detect toxic access combinations that violate compliance policies. Investigate conflicts and trigger access reviews for remediation.

Cover
๐Ÿ“ŠAccess Monitoring

Analyze actual resource usage against granted permissions. Identify dormant access and over-provisioned identities using audit log data.

Cover
โœจVeza Integrations

300+ connectors for cloud providers, identity systems, SaaS apps, databases, and on-prem platforms. Extend coverage with OAA or CSV upload.

Cover
๐ŸŒVeza APIs

Automate workflows, build custom integrations, and query the Access Graph programmatically. Includes OAA for onboarding unsupported applications.

Cover
๐Ÿ› ๏ธVeza Administration

Secure your tenant with SSO and MFA, manage users and roles, and monitor platform events and system settings.