Skip to main content

Getting Started with SlashID Identity Protection

To begin using SlashID Identity Protection, you first need to connect the data sources you want to monitor and secure. This section provides step-by-step guidance for configuring SlashID’s integrations with minimal setup effort.

Understanding Data Integrations

SlashID typically ingests two types of data from each integrated data source:

  • Identity data: this includes users, non-human identities (NHIs), permissions, roles, and other access-related entities. It forms the structural graph of your identity landscape.
  • Events: these are activity logs that show how, when, and where identities and credentials are being used in real time.

Both types of data are essential for full visibility and effective threat detection. If only one type is configured, SlashID’s monitoring and detection capabilities will be limited, and important risk signals may be missed.