LDX are specialists in cloud Identity and Access Management (IAM) with a particular focus on identity strategy & planning engagements and implementations based on next-generation Identity as a Service (IDaaS).


LDX have a tailored identity strategy methodology to ensure stakeholder buy-in, clarity on scope, capability needs and prioritisation to inform implementation initiatives.

Identity is the new control plane. Move beyond a perimeter-based approach to a Zero Trust framework as the security paradigm for the modern digital enterprise.

Ensure that user identities and entitlements are properly created, changed and disabled when employees or students join, move and leave (JML).

Australian specialists in Microsoft’s Entra ID (Azure Active Directory). LDX has been closely involved with Microsoft over the years including influencing new capabilities in Entra ID.

Empower users with seamless identity experiences. Provide an easy, fast sign-in experience to keep your workforce more secure, reduce time managing credentials and increase user productivity.

Help protect your organisation against breaches due to lost or stolen credentials with multi-factor authentication. Secure sensitive business applications against credential compromise.

Identity Provider onboarding of applications and application integration to support modern identity protocols including OIDC, SAML2, OAuth, SCIM etc.

Delivery of modern API authorisation capabilities (OAuth2, API Gateways etc) in support of digital integration initiatives.

End users no longer need to create, store or remember passwords. Sign in with one look or tap. Reduce your risk exposure with password alternatives.

Protect access to resources and data using risk-based adaptive access policies without compromising user experience.

Enable users to access your services with identity credentials that they already have instead of creating new ones.

Manage, control and monitor access to important resources in your organisation.

Secure your identity infrastructure. Automate detection and remediation of identity-based risks.

Manage user access, protect critical resources, retain and expand your existing IT systems while taking advantage of the control, visibility and security capabilities.