Identity governance in public institutions
IT overloaded with routine agenda?
IT departments waste valuable time creating user accounts, resetting passwords, auditing access rights, and managing permissions – leaving little room for strategic priorities. Access-related processes tied to employee onboarding and offboarding depend entirely on them.
The solution: IDM
Automates repetitive workflows
IDM system handles user account management and permission assignments automatically, enforcing security policies while minimizing human error.
Provides real-time access visibility
Forget Excel sheets. The system gives you real-time, structured access information across the organization – essential for audit readiness and proving compliance.
Reduces IT workload
Thanks to an intuitive user interface, everyday tasks like password resets or access requests can be handled directly by end users, without involvement of your IT department.
Ensures legal compliance
The system is fully aligned with current EU regulatory requirements and easily adaptable to future changes through configuration.
Seamlessly integrates with all systems
From email and document management to government systems, financial, geographic, and any custom or planned applications – our IDM integrates smoothly across your infrastructure.
Key features
Modular system tailored to your needs
The public administration environment places specific demands on identity management – from rigorous access control to traceability of all actions. All perfectly tailored to work within your processes. Ultimately, a smart setup meets legal requirements, provides control over access, and saves IT time and capacity.
Identity lifecycle management
IDM retrieves user data from the HR sytems and creates accounts in all applications with precisely defined permissions according to clearly defined rules.
Automated workflows
The approval and execution processes can be freely configured. Requests are most often approved by the supervisor or guarantor of the respective system. Everything else is done automatically.
Centralized access control
Centralized password management unifies password policies across systems. This helps to unify passwords even where SSO is not available.
User self-service
Users can manage their own identity: password changes, role requests, role approvals, … All without having to contact IT. Updates are reflected in the systems in real time.
Monitoring and audit
All system actions are logged and traceable. Audit records can be integrated into log collectors and SIEM tools to get a complete view of identities in the organization.
Services
We will guide you through the implementation from start to finish
Whether you’re starting from scratch or migrating from another platform, we guide you through every step. Our support covers both the core system and your implementation, ensuring incident resolution and uninterrupted operation – freeing up your IT team to focus on strategic goals.
Trouble-free implementation
From initial analysis and design to system integration, process configuration, testing, and go-live – we ensure a smooth deployment aligned with your expectations.
Zero-downtime migration
Our experts configure the system and fine-tune it during the test phase. When it’s time to switch, you transition to a fully functioning IDM overnight.
Dry-run & Quality Assurance
Automated tests verify deployment-specific configurations and check for regressions. A dry-run in the pilot phase allows full validation of planned changes before they go live.
Qualified support
Orchitech provides a robust support infrastructure, including direct access to product developers for high-level issue resolution and diagnostics.
Security and functional updates
Through commercial maintenance, we deliver regular updates, addressing both bugs and third-party security vulnerabilities. Wren:IDM follows established CVE-based disclosure processes.
DevOps integration
Support for containerized and Kubernetes deployments, automated rollout, and “configuration as code” practices ensure secure and efficient operations.
No vendor lock-in
Wren:IDM is open-source. We provide the full source code – including our customizations – under a perpetual license with no limits on user count, usage, or modification.
Compliance
Stay aligned with legal requirements
IDM helps you meet legal obligations under GDPR, NIS2, and other applicable EU regulations.

GDPR
IDM handles personal data responsibly, including often-overlooked processes such as data shredding, which are required by GDPR. Pseudonymization options allow data restoration (e.g. for returning employees) while maintaining privacy.

NIS2
The system enforces identity and access management requirements in line with the latest legislation. Legal changes usually require simple reconfiguration. IDM also generates detailed access reports for audit readiness.

eIDAS
IDM serves as the backbone for implementing eIDAS processes – automating qualified certificate distribution from providers to target systems.
References
Join our satisfied customers
We work with both domestic and international institutions, managing millions of identities. From lean setups to large-scale IAM ecosystems, we deliver modern, sustainable solutions. We always provide our clients with expert knowledge and strive to find the optimal solution. Our long-term client relationships often last over a decade.
Zábřeh municipal office
New implementation using Wren:IDM
“The deployed solution met all of our expectations. The system is clear and intuitive – it couldn’t be easier for users!”

Ministry of agriculture, Czech Republic
Emergency replacement with Wren:IDM
The implementation was completed on time. The system runs smoothly with minimal maintenance and operating costs.
University of South Bohemia
Long-term satisfaction with Wren:IDM
“Orchitech’s IDM system won us over with its speed and reliability. According to the RT system, we now handle 80% fewer requests. The remaining 20% are mostly just forgotten passwords.“