Documentation

Quick Start

Get TigerIdentity up and running in less than 15 minutes. This guide walks you through signing up, connecting your first identity source, and creating your first access policy.

01

Sign Up for TigerIdentity

Create your account and get instant access to the platform.

  • Visit the TigerIdentity dashboard
  • Create your organization
  • Get your API key and organization ID
02

Install the CLI

Install the TigerIdentity CLI to manage your configuration.

# Install via npm
npm install -g @tigeridentity/cli

# Or via Homebrew (macOS)
brew install tigeridentity/tap/tiger

# Verify installation
tiger --version
  • The CLI provides commands for policies, connectors, and more
  • Supports all major platforms: macOS, Linux, Windows
  • Auto-completion available for bash and zsh
03

Connect Your First Source

Connect TigerIdentity to your identity provider or infrastructure.

# Create a connector configuration file
cat > okta-connector.yaml <<EOF
version: v1
kind: Connector
metadata:
  name: okta-prod
  type: okta
spec:
  domain: your-domain.okta.com
  apiToken:
    secretRef: okta-api-token
  syncInterval: 5m
  resources:
    - users
    - groups
    - applications
EOF

# Deploy the connector
tiger connector create -f okta-connector.yaml

# Verify sync status
tiger connector status okta-prod
  • Supports 50+ identity sources out of the box
  • Real-time sync with configurable intervals
  • Automatic entity resolution and deduplication
04

Create Your First Policy

Define who can access what, when, and under which conditions.

# Create a policy file
cat > eng-db-access.yaml <<EOF
version: v1
kind: Policy
metadata:
  name: eng-db-access
  description: Engineers can access production DBs during business hours with MFA
spec:
  subjects:
    - type: group
      id: engineering
  resources:
    - type: database
      environment: production
  actions:
    - read
    - write
  conditions:
    - type: time
      businessHours: true
      timezone: America/Los_Angeles
    - type: mfa
      required: true
      maxAge: 1h
  effect: allow
  ttl: 8h
EOF

# Deploy the policy
tiger policy create -f eng-db-access.yaml
  • YAML-based policy language for readability
  • Support for complex conditions and context
  • Automatic policy validation before deployment
05

Verify Access Decisions

Test your policy and start enforcing access decisions.

# Simulate an access request
tiger policy simulate \
  --policy eng-db-access \
  --principal [email protected] \
  --resource db://prod-postgres \
  --action write

# Example output:
# ✓ Access ALLOWED
#   Policy: eng-db-access
#   Reason: All conditions satisfied
#   - MFA verified (1 minute ago)
#   - Time: Business hours (9:00 AM PST)
#   Session TTL: 8 hours

# Integrate with your application
curl -X POST https://api.tigeridentity.com/v1/decisions/evaluate \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{
    "principal": "[email protected]",
    "resource": "db://prod-postgres",
    "action": "write"
  }'
  • Test policies in simulation mode before enforcement
  • Sub-50ms decision latency at p95
  • Comprehensive audit logs for all decisions

Ready to Get Started?

Sign up for a free trial and implement Zero Standing Privilege in your organization today.