Identity management and authentication

Single sign-on and two-layer authentication

Synchronization from existing identity systems

Control over authorization management features