Every operations manager knows the problem: hundreds of contractors, suppliers and crew need access to your site. Managing all those accounts shouldn't be your job. With Thoryn, it isn't.
A truck driver arrives at the gate. A contractor starts on site. A crew turns up for race week. Each one needs access - fast. Thoryn makes it happen without your IT team lifting a finger.
A truck driver, site worker, or event crew member uses their own company login or credentials. Thoryn recognises who they are. No registration, no IT ticket, no waiting.
Thoryn checks their role, their assignment, and your rules. Gate open or gate closed - in seconds. No phone calls, no manual checks, no spreadsheets.
When the job is done, access is revoked. No forgotten accounts, no cleanup tickets for IT. And if the inspector asks who was on site last Tuesday - you have the answer in seconds.
Hundreds of external parties. Different companies, different systems, different contracts. Someone has to manage all that access - and right now, that someone is probably you.
A truck arrives. The driver needs to be verified - who he is, which company sent him, which zone he can enter. Behind him, there are twenty more. Every minute he waits costs money.
Your IT team is manually creating and revoking accounts for drivers and agents from 200 logistics companies. Half the old accounts are never cleaned up. At the next NIS2 audit, you can't prove who was on site when.
The driver uses his company credentials. Thoryn checks his identity, his assignment, and your access rules - in seconds. Gate opens or stays closed. No account at your end. Full audit log.
Race week arrives. Catering, broadcast crews, construction, security, logistics - 80 suppliers, 500 people on site across a few days. Each supplier manages their own team. You need to know who's where.
Accreditation is a spreadsheet nightmare. People arrive without the right access. Suppliers call you last-minute. After the event, you have no reliable record of who was on the restricted areas and when.
Each supplier registers their own crew against your access rules. Thoryn verifies credentials at the gate in real time. Build, race, breakdown - different access per phase. Event ends, access stops.
One project. Architect, main contractor, municipality, installers, zzp'ers. All temporary, all with different companies and systems. Every week, new people arrive on site who need access to plans, zones or systems.
Access is managed manually per phase. Confidential drawings end up in the wrong hands. After handover, contractors still have access to systems they should never see again. Nobody has time to clean it up.
Every contractor logs in with their own company credentials. You set what each role can see and where they can go - per project phase. Project ends: all access revoked automatically.
Right now, someone on your team is creating accounts for contractors, chasing revocations, and answering audit questions about who was on site when. Thoryn takes that off their plate - completely.
No accounts to create. No passwords to issue. Each contractor logs in with what they already have - their company login, a sector credential, or a digital ID. Your IT team does nothing.
Thoryn checks who they are, what they're authorised for, and whether that's still valid - right now, at the gate. No phone calls. No spreadsheets. No delays.
Which zones, which roles, which phases, how long. You decide. Thoryn makes sure it happens automatically - even when 500 people show up on the same day.
Every access event is logged and signed. Who was on site, when, through which gate, from which company. NIS2, ISPS and safety audits answered without digging through spreadsheets.
Okta and Entra are great for managing your own staff. The moment a contractor, supplier or external crew member needs access - they break down. Thoryn is built for exactly that problem.
| Capability | Okta / Entra / WorkOS | Thoryn |
|---|---|---|
| Enterprise SSO (SAML & OIDC) | ✓ | ✓ |
| Multi-organisation identity federation | - | ✓ |
| Each org manages their own people | - | ✓ |
| Automatic access revocation | - | ✓ |
| eIDAS 2.0 / EUDIW relying party | - | ✓ |
| Credential-gated physical access | - | ✓ |
| Sector credentials (BIG, UZI, ISPS, AVSEC) | - | ✓ |
| EU-only infrastructure | - | ✓ |
| CLOUD Act exposure | Direct | None |
| NIS2 / DORA ready out of the box | - | ✓ |
| Incorporation | US | NL |
| Go-live speed | Weeks | 5 days |
Critical infrastructure, healthcare, construction - in these sectors compliance isn't an afterthought. Thoryn is built for it from the ground up. The evidence pack is ready to hand over, not assembled after the fact.
We're working with a first group of ports, circuits and construction firms. No lengthy rollout - we start with one gate or one project, show the value fast, and go from there.
Thoryn connects to what you already have. External parties use their own credentials. You don't rebuild anything on either side.
We work alongside your team for the first integration. Your first external party is logging in before the week is out.
NIS2, ISPS, NEN 7510 audit logs are part of the base product - not billed separately at your next renewal.
Dutch B.V. All data on EU infrastructure. No US parent company. No CLOUD Act exposure. Full data residency documentation available.