Effortless Permission Management

Toucan permission visual

The most powerful user permission management systems are useless if they're so complex that no one can figure them out. Toucan's user management combines power with simplicity so that you can easily assign the right permissions to the right users without the headaches.

  • Control access at app, role, user, or row levels
  • Drive workflows and story flows via user configuration
  • Configure default homepage dashboards by role or user

Effortless Permission Management

 

The most powerful user permission management systems are useless if they're too complicated to figure out. Toucan's user management combines power with simplicity so you can easily assign the right permissions to the right users without the headaches.

  • Control access at app, role, user, or row levels
  • Drive workflows and story flows via user configuration
  • Configure default homepage dashboards by role or user

See what your users will see

 

With Toucan's "View As" feature, you can see exactly what a role or specific user will experience before deploying to production. The days of testing with fake users, roles, and passwords are over.

  • Ensure permissions are set as intended without simulating scenarios or connections
  • Test, adjust, and debug access rules in staging mode before deployment
  • Reduce the risk of shared "test accounts"

See what your users will see

Toucan User view

With Toucan's "View As" feature, you can see exactly what a role or specific user will experience before deploying to production. The days of testing with fake users, roles, and passwords are over.

  • Ensure permissions are set as intended without simulating scenarios or connections
  • Test, adjust, and debug access rules in staging mode before deployment
  • Reduce the risk of shared "test accounts"

Flexible authentication for any situation

Toucan visibility settings

When working with data, security is critical. But that doesn't mean you don't also need flexibility. We have both.

  • Use industry-standard protocols such as SAMLv2 and OpenID connect
  • Mix IdP sources to cover all your identification needs
  • Combine multiple SSOs with local permissions databases

Flexible authentication for any situation

 

When working with data, security is critical. But that doesn't mean you don't also need flexibility. Toucan has both.

  • Use industry-standard protocols such as SAMLv2 and OpenID connect
  • Mix IdP sources to cover all your identification needs
  • Combine multiple SSOs with local permissions databases

 

Cyber Security at Toucan


Toucan is committed to high-quality security.

Our security and privacy management practices adhere to some of the most comprehensive, robust cybersecurity standards (like the NIST framework). 

Cyber Security at Toucan

Toucan Cybersecurity Framework

Toucan is committed to creating high-quality security.

Better understand our security and privacy management practices, as broken down within the 5 functions of the NIST framework. Find out how Toucan applies these Functions in its product.

Customer Stories

"Toucan's a safe platform that fits all the security needs of the enterprise. We used Toucan as the main platform to deliver key insights to our investors."

BI Manager

LEARN MORE