Pricing

Price Calculator

Digitally sovereign, yet comfortable and secure for all user groups with Bare.ID in SaaS operation.

What is your use case?
B2E
B2E
Select B2E to authenticate your employees.
B2B
B2B
Select B2B to authenticate your business partners such as suppliers, partners, or business customers.
B2C
B2C
Select B2C to authenticate your end customers.
Contract Term
Save with a longer contract term
36 Months
12 Months
How many active users per month?
Monthly active users are users with clearly successfully completed activities (e.g., login). Password cracking attempts or other actions are explicitly not included in the calculation.
500+

Professional

Ideal for companies looking for a central IAM solution for their use case.

$99
/ Month
  • At least 2 Cluster Nodes
  • 1 User Federation
  • Connect up to 15 applications via OIDC & SAML
  • Multi-factor authentication methods (e.g., OTP via email, app, or hardware, WebAuthN-compliant hardware tokens, etc.)

Enterprise

Looking for advanced options and customized services? We're here to help.

Custom
  • All Premium Plan Features
  • Dedicated Support and Development
  • Customization
  • Unlimited Extensions
  • Optional Custom Operation & individual deployment options as On-Premise or Hybrid Solution

Plans at a Glance

Compare our plans across all features.

Basic
Professional
Premium
Custom
Authentication
Number of connected applications
The number of possible applications that can be connected to bare.ID and thus set up for single sign-on.
5
15
5
unlimited
Number of connected applications
The number of possible applications that can be connected to bare.ID and thus set up for single sign-on.
Basic:
5
Professional:
15
Premium:
5
Custom:
unlimited
Preconfigured application gallery
A selection of a variety of preconfigured SAML 2.0, OAuth 2.0 or OpenID Connect-based applications that can be authenticated with bare.ID with just a few clicks. If a standard application is missing, it is set up free of charge by the bare.id team.
unlimited
Preconfigured application gallery
A selection of a variety of preconfigured SAML 2.0, OAuth 2.0 or OpenID Connect-based applications that can be authenticated with bare.ID with just a few clicks. If a standard application is missing, it is set up free of charge by the bare.id team.
Basic:
Professional:
Premium:
Custom:
unlimited
Individual applications via OAuth 2.0/OpenID Connect
Individual applications that can be set up for single sign-on authentication via OAuth 2.0/OpenID Connect.
unlimited
Individual applications via OAuth 2.0/OpenID Connect
Individual applications that can be set up for single sign-on authentication via OAuth 2.0/OpenID Connect.
Basic:
Professional:
Premium:
Custom:
unlimited
Individual applications via SAML 2.0
Individual applications that can be set up for single sign-on authentication via SAML 2.0
unlimited
Individual applications via SAML 2.0
Individual applications that can be set up for single sign-on authentication via SAML 2.0
Basic:
Professional:
Premium:
Custom:
unlimited
Authentifizierung via RADIUS-Protokoll
Authentifizierung, die Applikationen und Systeme über das RADIUS-Protokoll absichert.
unlimited
Authentifizierung via RADIUS-Protokoll
Authentifizierung, die Applikationen und Systeme über das RADIUS-Protokoll absichert.
Basic:
Professional:
Premium:
Custom:
unlimited
Applikations-übergreifender Single Sign-On
Sichere einmalige Anmeldung für alle angebundenen Applikationen anstelle einer Vielzahl notwendiger Logins.
unlimited
Applikations-übergreifender Single Sign-On
Sichere einmalige Anmeldung für alle angebundenen Applikationen anstelle einer Vielzahl notwendiger Logins.
Basic:
Professional:
Premium:
Custom:
unlimited
Social login & external Identity Providers
Users can be authenticated via identity providers such as Facebook, Google or LinkedIn using OpenID Connect.
unlimited
Social login & external Identity Providers
Users can be authenticated via identity providers such as Facebook, Google or LinkedIn using OpenID Connect.
Basic:
Professional:
Premium:
Custom:
unlimited
Device authentication for IoT devices
Authenticate IoT devices for secure machine-to-machine communication.
unlimited
Device authentication for IoT devices
Authenticate IoT devices for secure machine-to-machine communication.
Basic:
Professional:
Premium:
Custom:
unlimited
IoT/M2M support including client credentials flow
Support for IoT and machine-to-machine scenarios including client credentials flow.
unlimited
IoT/M2M support including client credentials flow
Support for IoT and machine-to-machine scenarios including client credentials flow.
Basic:
Professional:
Premium:
Custom:
unlimited
Adaptive / kontextbezogene Authentifizierung
Kontextabhängige Authentifizierung, die Faktoren wie Standort, Gerät und Verhalten berücksichtigt.
unlimited
Adaptive / kontextbezogene Authentifizierung
Kontextabhängige Authentifizierung, die Faktoren wie Standort, Gerät und Verhalten berücksichtigt.
Basic:
Professional:
Premium:
Custom:
unlimited
Verifiable Credential Support
Support for verifiable credentials for decentralized identity proofs.
unlimited
Verifiable Credential Support
Support for verifiable credentials for decentralized identity proofs.
Basic:
Professional:
Premium:
Custom:
unlimited
Support for additional/individual Authenticators
Support for additional or individual authentication mechanisms.
unlimited
Support for additional/individual Authenticators
Support for additional or individual authentication mechanisms.
Basic:
Professional:
Premium:
Custom:
unlimited
Identity & Access Management
User database management via Bare.ID
Users, groups, roles and authentication methods can be managed centrally via Bare.ID's user administration.
User database management via Bare.ID
Users, groups, roles and authentication methods can be managed centrally via Bare.ID's user administration.
Basic:
Professional:
Premium:
Custom:
unlimited
User-defined identity providers
Configure and authenticate users via custom SAML and OAuth 2.0/OpenID Connect-based identity providers.
5
unlimited
unlimited
User-defined identity providers
Configure and authenticate users via custom SAML and OAuth 2.0/OpenID Connect-based identity providers.
Basic:
Professional:
5
Premium:
Custom:
unlimited
User database via directory service
Federate users, groups, and passwords from your directory service via LDAP or Kerberos.
unlimited
unlimited
User database via directory service
Federate users, groups, and passwords from your directory service via LDAP or Kerberos.
Basic:
Professional:
Premium:
Custom:
unlimited
User database via SCIM synchronization
Sync users, groups, and passwords via SCIM.
unlimited
unlimited
User database via SCIM synchronization
Sync users, groups, and passwords via SCIM.
Basic:
Professional:
Premium:
Custom:
unlimited
User database via individual API
Federate users, groups, and passwords via an API.
unlimited
User database via individual API
Federate users, groups, and passwords via an API.
Basic:
Professional:
Premium:
Custom:
unlimited
Role management
Create application-specific and global roles that can be evaluated by connected applications for access control.
Role management
Create application-specific and global roles that can be evaluated by connected applications for access control.
Basic:
Professional:
Premium:
Custom:
unlimited
Group management
Define a group hierarchy and combine different roles into groups. This allows you to easily assign the same set of roles to multiple users.
Group management
Define a group hierarchy and combine different roles into groups. This allows you to easily assign the same set of roles to multiple users.
Basic:
Professional:
Premium:
Custom:
unlimited
Application access role
Determine whether connected applications should only be authenticated if a user has a corresponding role assignment, or whether the authorization is completely left to the connected application.
Application access role
Determine whether connected applications should only be authenticated if a user has a corresponding role assignment, or whether the authorization is completely left to the connected application.
Basic:
Professional:
Premium:
Custom:
unlimited
Customer-specific attributes for users
Assign additional attributes to users, such as job title, address, etc.
Customer-specific attributes for users
Assign additional attributes to users, such as job title, address, etc.
Basic:
Professional:
Premium:
Custom:
unlimited
Scheduled permissions
Automatically assign roles and permissions to users for a specific period of time — ideal for temporary projects or onboarding processes.
Scheduled permissions
Automatically assign roles and permissions to users for a specific period of time — ideal for temporary projects or onboarding processes.
Basic:
Professional:
Premium:
Custom:
unlimited
Detect inactive users
Identify inactive accounts and mitigate security risks with automatic deactivation or notification.
Detect inactive users
Identify inactive accounts and mitigate security risks with automatic deactivation or notification.
Basic:
Professional:
Premium:
Custom:
unlimited
Detailed role & group reports
Generate transparent reports on user assignments and group memberships for compliance purposes.
Detailed role & group reports
Generate transparent reports on user assignments and group memberships for compliance purposes.
Basic:
Professional:
Premium:
Custom:
unlimited
Universal Directory including User Synchronization from multiple Meta Directories
Universal directory with user synchronization from multiple meta directories.
Universal Directory including User Synchronization from multiple Meta Directories
Universal directory with user synchronization from multiple meta directories.
Basic:
Professional:
Premium:
Custom:
unlimited
Self-service portals for end users
Self-service portals that enable end users to independently manage profile data and reset passwords.
Self-service portals for end users
Self-service portals that enable end users to independently manage profile data and reset passwords.
Basic:
Professional:
Premium:
Custom:
unlimited
Delegated administration
Delegate administrative tasks to specific users or groups.
Delegated administration
Delegate administrative tasks to specific users or groups.
Basic:
Professional:
Premium:
Custom:
unlimited
Advanced Integrations
Users, rights and role management via API
Query, create, update, and delete user and role information via a standardized interface. This simplifies the management of user accounts and roles in applications and increases security by complying with standards.
Users, rights and role management via API
Query, create, update, and delete user and role information via a standardized interface. This simplifies the management of user accounts and roles in applications and increases security by complying with standards.
Basic:
Professional:
Premium:
Custom:
unlimited
Outbound webhooks
Changes to user data are synchronized with external applications via webhooks.
Outbound webhooks
Changes to user data are synchronized with external applications via webhooks.
Basic:
Professional:
Premium:
Custom:
unlimited
Users and roles can be retrieved via SCIM-compatible API
Users and roles can be retrieved via SCIM-compatible API
Basic:
Professional:
Premium:
Custom:
unlimited
Individual user provisioning
Synchronize the user directory with external services every time you make changes.
Individual user provisioning
Synchronize the user directory with external services every time you make changes.
Basic:
Professional:
Premium:
Custom:
unlimited
Event KPIs available via API
Event KPIs can be integrated with other applications or dashboards to improve monitoring and analysis of application events.
Event KPIs available via API
Event KPIs can be integrated with other applications or dashboards to improve monitoring and analysis of application events.
Basic:
Professional:
Premium:
Custom:
unlimited
VPN connection
Whether via LDAP/Active Directory federation or safety-critical applications — we connect local infrastructure to bare.id systems via VPN with WireGuard.
VPN connection
Whether via LDAP/Active Directory federation or safety-critical applications — we connect local infrastructure to bare.id systems via VPN with WireGuard.
Basic:
Professional:
Premium:
Custom:
unlimited
Developer tools and SDK support
Developer tools and SDK support for seamless integration with existing systems
Developer tools and SDK support
Developer tools and SDK support for seamless integration with existing systems
Basic:
Professional:
Premium:
Custom:
unlimited
API-Security
Umfassende API-Sicherheitsfunktionen zum Schutz Ihrer Schnittstellen.
API-Security
Umfassende API-Sicherheitsfunktionen zum Schutz Ihrer Schnittstellen.
Basic:
Professional:
Premium:
Custom:
unlimited
Authentication Security
Brute force protection
Brute force protection detects attacks early on and blocks the corresponding IP addresses or user accounts temporarily or permanently to ensure the security of applications.
Brute force protection
Brute force protection detects attacks early on and blocks the corresponding IP addresses or user accounts temporarily or permanently to ensure the security of applications.
Basic:
Professional:
Premium:
Custom:
unlimited
Detailed password requirements
Flexible and individual configuration of minimum password requirements.
Detailed password requirements
Flexible and individual configuration of minimum password requirements.
Basic:
Professional:
Premium:
Custom:
unlimited
Detecting insecure passwords
When users set new passwords, passwords that appear in the largest databases of leaked passwords and could be used for automated attacks are optionally rejected.
Detecting insecure passwords
When users set new passwords, passwords that appear in the largest databases of leaked passwords and could be used for automated attacks are optionally rejected.
Basic:
Professional:
Premium:
Custom:
unlimited
Have I been Pwned — password verification
When logging in, bare.ID can check whether the password used has been compromised in the meantime and ask the user to change their password.
Have I been Pwned — password verification
When logging in, bare.ID can check whether the password used has been compromised in the meantime and ask the user to change their password.
Basic:
Professional:
Premium:
Custom:
unlimited
Passwordless authentication
Authenticate users using alternative password methods (knowledge factor).
Passwordless authentication
Authenticate users using alternative password methods (knowledge factor).
Basic:
Professional:
Premium:
Custom:
unlimited
Passwordless authentication (cryptographic)
The user does not have to enter a user name or password — their identity and access rights are determined using alternative cryptographic methods.
Passwordless authentication (cryptographic)
The user does not have to enter a user name or password — their identity and access rights are determined using alternative cryptographic methods.
Basic:
Professional:
Premium:
Custom:
unlimited
MFA via one-time password via email
Multi-factor authentication process that provides an additional layer of security in addition to the password by sending a one-time password (OTP) via email for verification.
MFA via one-time password via email
Multi-factor authentication process that provides an additional layer of security in addition to the password by sending a one-time password (OTP) via email for verification.
Basic:
Professional:
Premium:
Custom:
unlimited
MFA via one-time password via SMS
Multi-factor authentication process that provides an additional layer of security in addition to the password, in which a one-time password (OTP) is sent via SMS for verification.
External license fees
External license fees
External license fees
MFA via one-time password via SMS
Multi-factor authentication process that provides an additional layer of security in addition to the password, in which a one-time password (OTP) is sent via SMS for verification.
Basic:
Professional:
External license fees
Premium:
Custom:
unlimited
MFA via time-based one-time password via Authenticator App/ Hardware Generator
Multi-factor authentication process that provides an additional layer of security in addition to the password, in which a time-based one-time password (TOTP) is generated via an authenticator app or hardware generator for verification.
MFA via time-based one-time password via Authenticator App/ Hardware Generator
Multi-factor authentication process that provides an additional layer of security in addition to the password, in which a time-based one-time password (TOTP) is generated via an authenticator app or hardware generator for verification.
Basic:
Professional:
Premium:
Custom:
unlimited
MFA via Apple Passkey
Multi-factor authentication process that provides an additional layer of security in addition to or as an alternative to the password that uses the Apple Passkey for authentication.
MFA via Apple Passkey
Multi-factor authentication process that provides an additional layer of security in addition to or as an alternative to the password that uses the Apple Passkey for authentication.
Basic:
Professional:
Premium:
Custom:
unlimited
MFA via FIDO tokens
Multi-factor authentication process that provides an additional layer of security in addition to or as an alternative to a password, which uses FIDO tokens for authentication.
MFA via FIDO tokens
Multi-factor authentication process that provides an additional layer of security in addition to or as an alternative to a password, which uses FIDO tokens for authentication.
Basic:
Professional:
Premium:
Custom:
unlimited
MFA via WebAuthn compatible mechanisms
Multi-factor authentication process that provides an additional layer of security in addition to or as an alternative to a password, using any WebAuthn-compatible authentication mechanism.
MFA via WebAuthn compatible mechanisms
Multi-factor authentication process that provides an additional layer of security in addition to or as an alternative to a password, using any WebAuthn-compatible authentication mechanism.
Basic:
Professional:
Premium:
Custom:
unlimited
Certificate-based authentication
Existing smart cards or client certificates on your systems: Users authenticate themselves using existing X.509 certificates.
Certificate-based authentication
Existing smart cards or client certificates on your systems: Users authenticate themselves using existing X.509 certificates.
Basic:
Professional:
Premium:
Custom:
unlimited
Step-up authentication
Critical applications or actions that require a higher level of security guarantee Use so-called step-up authentication or level-based authentication to ensure that every application and action is authenticated with the required level of security.
Step-up authentication
Critical applications or actions that require a higher level of security guarantee Use so-called step-up authentication or level-based authentication to ensure that every application and action is authenticated with the required level of security.
Basic:
Professional:
Premium:
Custom:
unlimited
UMA-compliant, fine-grained rights management
Control access rights to resources within an application very precisely with UMA-compliant, fine-grained rights management. Restrict or approve access to individual resources.
UMA-compliant, fine-grained rights management
Control access rights to resources within an application very precisely with UMA-compliant, fine-grained rights management. Restrict or approve access to individual resources.
Basic:
Professional:
Premium:
Custom:
unlimited
Security event notifications
Get instant notifications about security-related events, such as failed login attempts or suspicious activity.
Security event notifications
Get instant notifications about security-related events, such as failed login attempts or suspicious activity.
Basic:
Professional:
Premium:
Custom:
unlimited
MYRA DDoS Protection
Protect your identity platform from targeted attacks with MyRA's powerful DDoS defense.
MYRA DDoS Protection
Protect your identity platform from targeted attacks with MyRA's powerful DDoS defense.
Basic:
Professional:
Premium:
Custom:
unlimited
Advanced passwordless login with dedicated flows
Advanced passwordless login with dedicated authentication flows.
Advanced passwordless login with dedicated flows
Advanced passwordless login with dedicated authentication flows.
Basic:
Professional:
Premium:
Custom:
unlimited
Security Dashboard
Central security dashboard to monitor safety-related events.
Security Dashboard
Central security dashboard to monitor safety-related events.
Basic:
Professional:
Premium:
Custom:
unlimited
Security Score
Evaluate your instance's security configuration.
Security Score
Evaluate your instance's security configuration.
Basic:
Professional:
Premium:
Custom:
unlimited
Branding & Whitelabel Operation
Login masks in the individual user experience
Design the login masks in your own branding.
Login masks in the individual user experience
Design the login masks in your own branding.
Basic:
Professional:
Premium:
Custom:
unlimited
No-code configuration of corporate identity
Define colors, effects and positions of UI elements according to individual corporate design guidelines — simply and without code.
No-code configuration of corporate identity
Define colors, effects and positions of UI elements according to individual corporate design guidelines — simply and without code.
Basic:
Professional:
Premium:
Custom:
unlimited
Custom logos, favicons and background images
Easily upload data to your own instance. We take care of high-performance delivery.
Custom logos, favicons and background images
Easily upload data to your own instance. We take care of high-performance delivery.
Basic:
Professional:
Premium:
Custom:
unlimited
Email templates suitable for CI
The HTML email templates automatically adopt the configured CI.
Email templates suitable for CI
The HTML email templates automatically adopt the configured CI.
Basic:
Professional:
Premium:
Custom:
unlimited
Hide Bare.ID label
All references to the provider Bare.ID can be completely hidden.
Hide Bare.ID label
All references to the provider Bare.ID can be completely hidden.
Basic:
Professional:
Premium:
Custom:
unlimited
Impressum & privacy links
Add your own legal notice and privacy policy.
Impressum & privacy links
Add your own legal notice and privacy policy.
Basic:
Professional:
Premium:
Custom:
unlimited
Customizable footer links
Define up to three additional individual links, e.g. for support, terms and conditions or the like.
Customizable footer links
Define up to three additional individual links, e.g. for support, terms and conditions or the like.
Basic:
Professional:
Premium:
Custom:
unlimited
Multilingualism
Use the solution in multiple languages.
Multilingualism
Use the solution in multiple languages.
Basic:
Professional:
Premium:
Custom:
unlimited
Customizable texts
All texts that are displayed to users can be fully customized.
Customizable texts
All texts that are displayed to users can be fully customized.
Basic:
Professional:
Premium:
Custom:
unlimited
Individual domain per instance
A unique, dedicated domain per instance that is used exclusively within that instance.
Individual domain per instance
A unique, dedicated domain per instance that is used exclusively within that instance.
Basic:
Professional:
Premium:
Custom:
unlimited
Use your own domain
Deploy bare.id instances as a subdomain of your own (APEX) domain and achieve a higher level of trust.
External license fees
External license fees
Use your own domain
Deploy bare.id instances as a subdomain of your own (APEX) domain and achieve a higher level of trust.
Basic:
Professional:
External license fees
Premium:
Custom:
unlimited
E-mail sender can be customized
The email sender of all emails sent to users by Bare.id can be customized individually.
E-mail sender can be customized
The email sender of all emails sent to users by Bare.id can be customized individually.
Basic:
Professional:
Premium:
Custom:
unlimited
SMS senders can be customized
The SMS sender of all SMS messages sent to users by Bare.id can be customized individually.
SMS senders can be customized
The SMS sender of all SMS messages sent to users by Bare.id can be customized individually.
Basic:
Professional:
Premium:
Custom:
unlimited
TLS-only via Let's Encrypt certificates
The application is only accessible via a secure HTTPS connection (TLS) and the certificates used for encryption come from Let's Encrypt.
TLS-only via Let's Encrypt certificates
The application is only accessible via a secure HTTPS connection (TLS) and the certificates used for encryption come from Let's Encrypt.
Basic:
Professional:
Premium:
Custom:
unlimited
Your own TLS certificates
If the IT security policy does not allow the use of Let's Encrypt certificates for TLS termination, simply bring certificates from your authorized issuer with you. Only available for custom domains.
Your own TLS certificates
If the IT security policy does not allow the use of Let's Encrypt certificates for TLS termination, simply bring certificates from your authorized issuer with you. Only available for custom domains.
Basic:
Professional:
Premium:
Custom:
unlimited
Our own email delivery service provider
Use your own SMTP mail server or provider such as Postmark, SendGrid, or Mailjet to send transactional emails via your own infrastructure with an individual sender email address.
Our own email delivery service provider
Use your own SMTP mail server or provider such as Postmark, SendGrid, or Mailjet to send transactional emails via your own infrastructure with an individual sender email address.
Basic:
Professional:
Premium:
Custom:
unlimited
Custom templates
Fully customizable templates outside the specified framework.
Custom templates
Fully customizable templates outside the specified framework.
Basic:
Professional:
Premium:
Custom:
unlimited
Individual branding per application
Adapt the design of each application to your desired branding — from logos to colors to layouts.
Individual branding per application
Adapt the design of each application to your desired branding — from logos to colors to layouts.
Basic:
Professional:
Premium:
Custom:
unlimited
Governance and Compliance
Data center location Germany
All Bare.id GmbH data centers are located exclusively in Germany.
Data center location Germany
All Bare.id GmbH data centers are located exclusively in Germany.
Basic:
Professional:
Premium:
Custom:
unlimited
KRITIS compliant operation
Our data center design and multi-redundant deployment meet the redundancy and data center requirements of the BSI for critical infrastructures.
KRITIS compliant operation
Our data center design and multi-redundant deployment meet the redundancy and data center requirements of the BSI for critical infrastructures.
Basic:
Professional:
Premium:
Custom:
unlimited
GDPR compliant
Bare.id can be operated in a 100% GDPR-compliant manner.
GDPR compliant
Bare.id can be operated in a 100% GDPR-compliant manner.
Basic:
Professional:
Premium:
Custom:
unlimited
ISO27001 compliant service
Bare.id operates an ISMS (information security management system) in accordance with ISO27001.
ISO27001 compliant service
Bare.id operates an ISMS (information security management system) in accordance with ISO27001.
Basic:
Professional:
Premium:
Custom:
unlimited
Applikations-basierte Aktivitätslogs
Informationen über Aktivitäten innerhalb von Applikationen – die Logs können genutzt werden, um Aktivitäten innerhalb der Applikation zu verfolgen, Fehler zu diagnostizieren und die Sicherheit zu überwachen.
Applikations-basierte Aktivitätslogs
Informationen über Aktivitäten innerhalb von Applikationen – die Logs können genutzt werden, um Aktivitäten innerhalb der Applikation zu verfolgen, Fehler zu diagnostizieren und die Sicherheit zu überwachen.
Basic:
Professional:
Premium:
Custom:
unlimited
User-based activity logs
Information about activities performed by users — the logs can be used to track user activity, diagnose errors, and monitor security.
User-based activity logs
Information about activities performed by users — the logs can be used to track user activity, diagnose errors, and monitor security.
Basic:
Professional:
Premium:
Custom:
unlimited
KPI dashboard
A central dashboard within the bare.ID admin interface that contains all relevant KPIs.
KPI dashboard
A central dashboard within the bare.ID admin interface that contains all relevant KPIs.
Basic:
Professional:
Premium:
Custom:
unlimited
Event & log retentions
All event and log retentions are saved for a specific period of time.
90 days
90 days
90 days
90 days
Event & log retentions
All event and log retentions are saved for a specific period of time.
Basic:
90 days
Professional:
90 days
Premium:
90 days
Custom:
unlimited
Log streaming (CIAM integration)
Log streaming automatically stores logs in a third-party storage and analysis tool, which enables near real-time responses to security threats, performance failures, and other issues.
Log streaming (CIAM integration)
Log streaming automatically stores logs in a third-party storage and analysis tool, which enables near real-time responses to security threats, performance failures, and other issues.
Basic:
Professional:
Premium:
Custom:
unlimited
MTLS-secured internal connections
Even within Bare.ID, data is always encrypted during transport.
MTLS-secured internal connections
Even within Bare.ID, data is always encrypted during transport.
Basic:
Professional:
Premium:
Custom:
unlimited
Consent Management
Create different versions of your terms of use and get approval.
Consent Management
Create different versions of your terms of use and get approval.
Basic:
Professional:
Premium:
Custom:
unlimited
Platform and Operations
Daily external data backup
Up to one year of backups based on the grandfather-son principle (10 daily, 5 weekly, 12 monthly). Backups to offline data centers.
Daily external data backup
Up to one year of backups based on the grandfather-son principle (10 daily, 5 weekly, 12 monthly). Backups to offline data centers.
Basic:
Professional:
Premium:
Custom:
unlimited
Multiple redundant database clusters
We operate our databases as an active-passive cluster in the primary data center — in the secondary data center, we have a second DB cluster available as a hot standby.
Multiple redundant database clusters
We operate our databases as an active-passive cluster in the primary data center — in the secondary data center, we have a second DB cluster available as a hot standby.
Basic:
Professional:
Premium:
Custom:
unlimited
Guaranteed availability
The procedural guaranteed availability is 99.9%.
Guaranteed availability
The procedural guaranteed availability is 99.9%.
Basic:
Professional:
Premium:
Custom:
unlimited
Technical support in English and German
Our support team works in and from Germany and offers barrier-free support at native speaker level in German and English.
Technical support in English and German
Our support team works in and from Germany and offers barrier-free support at native speaker level in German and English.
Basic:
Professional:
Premium:
Custom:
unlimited
24/7 Hotline
24/7-Support ist bei kritischen und schwerwiegenden Störungen der Fehlerklasse 1 und 2 verfügbar.
24/7 Hotline
24/7-Support ist bei kritischen und schwerwiegenden Störungen der Fehlerklasse 1 und 2 verfügbar.
Basic:
Professional:
Premium:
Custom:
unlimited
Scheduled maintenance windows
Our maintenance windows are outside regular business hours and are announced at least one week in advance.
Scheduled maintenance windows
Our maintenance windows are outside regular business hours and are announced at least one week in advance.
Basic:
Professional:
Premium:
Custom:
unlimited
Automatic patch and update management
We always work with up-to-date and patched components. Our redundant deployments enable us to perform updates without service interruption.
Automatic patch and update management
We always work with up-to-date and patched components. Our redundant deployments enable us to perform updates without service interruption.
Basic:
Professional:
Premium:
Custom:
unlimited
Dediziertes Deployment
Dedizierte Applikations- und Datenbank-Cluster werden für unseren Service in kundenspezifische Netzwerksegmente ausgerollt, jeweils mit kundenspezifischen kryptografischen Schlüsseln für Data-At-Rest und in Transit.
Dediziertes Deployment
Dedizierte Applikations- und Datenbank-Cluster werden für unseren Service in kundenspezifische Netzwerksegmente ausgerollt, jeweils mit kundenspezifischen kryptografischen Schlüsseln für Data-At-Rest und in Transit.
Basic:
Professional:
Premium:
Custom:
unlimited
Organize data into instances
Whether it's different organizations, test and production environments, or your own networks — the bare.ID service is multi-tenant and allows you to create several completely independent instances.
1
3
5
unlimited
Organize data into instances
Whether it's different organizations, test and production environments, or your own networks — the bare.ID service is multi-tenant and allows you to create several completely independent instances.
Basic:
1
Professional:
3
Premium:
1
Custom:
unlimited
Analytics & Monitoring
Umfassende Analyse- und Überwachungsfunktionen für Ihre Identitätsplattform.
Analytics & Monitoring
Umfassende Analyse- und Überwachungsfunktionen für Ihre Identitätsplattform.
Basic:
Professional:
Premium:
Custom:
unlimited
Extensibility
Script-based extensibility
Using scripts, for example, to transform data or connect external sources.
Script-based extensibility
Using scripts, for example, to transform data or connect external sources.
Basic:
Professional:
Premium:
Custom:
unlimited
Event geolocation
Assigning IP addresses to countries for analyses, etc.
Event geolocation
Assigning IP addresses to countries for analyses, etc.
Basic:
Professional:
Premium:
Custom:
unlimited
Workflow Engine and Custom Actions/ Scripts/ No-code workflows
Workflow engine and custom actions, scripts, or no-code workflows.
Workflow Engine and Custom Actions/ Scripts/ No-code workflows
Workflow engine and custom actions, scripts, or no-code workflows.
Basic:
Professional:
Premium:
Custom:
unlimited
Governance & Lifecycle
Advanced consent management, GDPR-compliant consent management
Advanced and GDPR-compliant consent management for comprehensive consent management.
Advanced consent management, GDPR-compliant consent management
Advanced and GDPR-compliant consent management for comprehensive consent management.
Basic:
Professional:
Premium:
Custom:
unlimited
IGA (Identity Governance and Lifecycle)
Identity governance and administration to manage the entire identity lifecycle.
IGA (Identity Governance and Lifecycle)
Identity governance and administration to manage the entire identity lifecycle.
Basic:
Professional:
Premium:
Custom:
unlimited
Lifecycle management
Automated provisioning/deprovisioning and recertification.
Lifecycle management
Automated provisioning/deprovisioning and recertification.
Basic:
Professional:
Premium:
Custom:
unlimited
SCIM provisioning
Automated user provisioning via SCIM protocol.
SCIM provisioning
Automated user provisioning via SCIM protocol.
Basic:
Professional:
Premium:
Custom:
unlimited
CIAM-specific features
Progressive profiling
Step-by-step collection of user profile data across multiple interactions.
Progressive profiling
Step-by-step collection of user profile data across multiple interactions.
Basic:
Professional:
Premium:
Custom:
unlimited
B2C flows
Specialized authentication flows for business-to-consumer scenarios.
B2C flows
Specialized authentication flows for business-to-consumer scenarios.
Basic:
Professional:
Premium:
Custom:
unlimited
Advanced Analytics / Threat Detection
AI-basierte Threat Insight
KI-gestützte Bedrohungserkennung für proaktive Sicherheitsmaßnahmen.
AI-basierte Threat Insight
KI-gestützte Bedrohungserkennung für proaktive Sicherheitsmaßnahmen.
Basic:
Professional:
Premium:
Custom:
unlimited
User Behavior Analytics
Analyze user behavior to identify anomalies and threats.
User Behavior Analytics
Analyze user behavior to identify anomalies and threats.
Basic:
Professional:
Premium:
Custom:
unlimited
Anomaly Detection
Automatic detection of deviations in user behavior and system access.
Anomaly Detection
Automatic detection of deviations in user behavior and system access.
Basic:
Professional:
Premium:
Custom:
unlimited
AI Integration
Freely selectable AI model
Free selection of the AI model for individual requirements.
Freely selectable AI model
Free selection of the AI model for individual requirements.
Basic:
Professional:
Premium:
Custom:
unlimited
Fine-grained data provisioning
Fine-grained control of data provision for AI integrations.
Fine-grained data provisioning
Fine-grained control of data provision for AI integrations.
Basic:
Professional:
Premium:
Custom:
unlimited
Operational flexibility

Choose the operating model that suits you

Bare.ID's SaaS operation already meets high requirements from the public sector and critical infrastructure (KRITIS) environments. For specific circumstances, Bare.ID also professionally and practically supports alternative operating models. Our principle: The same Bare.ID platform for all operating models.

Suitable for:

  • Special requirements in the public sector
  • Special compliance or architectural requirements
  • Combinations of cloud and on-premise operation

SaaS with Bare.ID

Digitally sovereign operation in certified data centers in Germany.

On-Prem / Self-Hosted

When maximum control or specific compliance requirements are necessary.

Hybrid

International setups or if individual applications need to remain local.

What Our Customers Say

“With Bare.ID, a strategic vision of mine has finally become reality: A central IAM for ZDF Studios and their network — with administrative authority within our IT team and without dependence on parent company ZDF.”

Simon Zsebök
VP Digital Innovation | ZDF Studios

“With Bare.ID, we rely on a German manufacturer who not only impresses in terms of reliability, but also uses the latest 2FA technology with our hardware solution.”

Alexander Summerer
Product Management | Swissbit AG

“The switch from Keycloak to Bare ID was completed in just three days — with the technical expertise that we had often missed from our service provider before and a SaaS operation that permanently relieves our IT workload: a real game changer.”

Lukas Lachetta
Digital Services | Rheinbahn AG

“Bare.ID offers a multi-factor authentication solution developed and operated in Germany that meets all standard requirements — an important aspect in current times of crisis. As consulting experts for public administration in digitization and process optimization, we are the right link for organizations that want to integrate Bare.id into their implementation projects.”

Markus Kuhn
Tribe Lead Public | RS Group

“Bare.ID impresses with an ideal combination of strong IT security and high usability. This not only meets our safety requirements, but also significantly simplifies internal processes.”

Christian Koch
Head of IT | ZDF Digital

“With Bare.ID's secure identity and access management system, we have gained a partner that now enables our users to automatically authenticate to web applications. In doing so, we have created a holistic solution that offers users maximum convenience.”

Alexander Woeschka
Sales manager | Digitronic

“As a Bare.ID partner, we particularly appreciate the joint focus on digital sovereignty. At a time when data security & independence are essential, Bare.id is setting new standards as a German manufacturer with an open source component. The first-class, German-language support stands out positively from the market environment.”

Daniel Stutz
Managing Director | XplicitTrust

“Whether it's OTP, facial recognition, or FIDO2 hardware — Bare.ID's flexibility in MFA methods is a game changer for our customers.”

Jochen Göring
Director of Product Management | DRACOON
Q&A

FAQs

Do you have any further questions? Feel free to schedule a non-binding discovery call.

How does Bare.ID's SaaS licensing model work (MAU-based)?

Bare.ID is billed based on Monthly Active Users (MAU). You only pay for users who have logged in at least once in the respective month. This makes costs transparent and scalable – ideal for companies with fluctuating user numbers.

What are Monthly Active Users (MAUs)?

An MAU is a unique user who has authenticated at least once within a calendar month. Multiple logins by the same user are counted only once.

How does Bare.ID handle fluctuating user numbers?

The MAU model adjusts automatically. Minor overages are simply billed retrospectively – the service remains fully usable at all times.

Are there special conditions for non-profit organizations?

Yes, Bare.ID offers special conditions for non-profit organizations, educational institutions, and government agencies. Please contact sales for a customized offer.

Is there a free trial version?

Yes, Bare.ID offers a free trial with full functionality. Individual agreements can be made for proof-of-concepts.

What additional services can be booked?

In addition to the platform tariffs, various services, such as integration, can be flexibly added and tailored to individual needs.

What payment models are supported?

Bare.ID supports monthly or annual payments. Companies can also opt for quarterly billing. Payment is made via invoice or SEPA direct debit.

Contact Us

Schedule a free initial consultation now.

Contact Information

Please fill out the following fields and we will get back to you as soon as possible.

How did you hear about us?*

Thank you for your message!

We have received your request and will get back to you as soon as possible.

Oops, something went wrong. Please check your details and try again.