Built for ports, racing circuits and construction sites

Your contractors get in fast.
Your IT team can relax.
Your auditor gets every answer.

Every operations manager knows the problem: hundreds of contractors, suppliers and crew need access to your site. Managing all those accounts shouldn't be your job. With Thoryn, it isn't.

Zero Accounts to create for external parties
Seconds To verify a contractor at the gate
Automatic Access revoked when contract ends
5 days To first external party login
Without Thoryn
⏳ Contractors queue at the gate - manual ID check
📋 IT creates accounts manually for every external party
👻 Old accounts stay open long after contracts end
❓ Audit: who was on site last Tuesday at 14:00?
With Thoryn
✓ Contractor verified at the gate in seconds - no queue
✓ No accounts to create - they log in with their own credentials
✓ Access revoked automatically when assignment ends
✓ Full audit trail - every access event logged and signed
NIS2 Article 21
ISPS compliant
NEN 7510
eIDAS 2.0 / EUDIW
EU-only infrastructure
Zero CLOUD Act exposure

Your contractors bring their own credentials.
You set the rules.

A truck driver arrives at the gate. A contractor starts on site. A crew turns up for race week. Each one needs access - fast. Thoryn makes it happen without your IT team lifting a finger.

Step 01

Your contractor shows up - no account needed

A truck driver, site worker, or event crew member uses their own company login or credentials. Thoryn recognises who they are. No registration, no IT ticket, no waiting.

Step 02

Access granted - exactly what they need, nothing more

Thoryn checks their role, their assignment, and your rules. Gate open or gate closed - in seconds. No phone calls, no manual checks, no spreadsheets.

Step 03

Contract ends - access stops automatically

When the job is done, access is revoked. No forgotten accounts, no cleanup tickets for IT. And if the inspector asks who was on site last Tuesday - you have the answer in seconds.

The same problem at every gate,
every site, every event.

Hundreds of external parties. Different companies, different systems, different contracts. Someone has to manage all that access - and right now, that someone is probably you.

Ports & terminals

200 logistics companies. One gate. Zero account management.

The situation

A truck arrives. The driver needs to be verified - who he is, which company sent him, which zone he can enter. Behind him, there are twenty more. Every minute he waits costs money.

The problem

Your IT team is manually creating and revoking accounts for drivers and agents from 200 logistics companies. Half the old accounts are never cleaned up. At the next NIS2 audit, you can't prove who was on site when.

The approach

The driver uses his company credentials. Thoryn checks his identity, his assignment, and your access rules - in seconds. Gate opens or stays closed. No account at your end. Full audit log.

Faster throughput at the gate · Zero IT overhead for external parties · Audit-ready for NIS2 and ISPS
Events & racing circuits

Race week. 500 crew. 80 companies. 3 days to get it right.

The situation

Race week arrives. Catering, broadcast crews, construction, security, logistics - 80 suppliers, 500 people on site across a few days. Each supplier manages their own team. You need to know who's where.

The problem

Accreditation is a spreadsheet nightmare. People arrive without the right access. Suppliers call you last-minute. After the event, you have no reliable record of who was on the restricted areas and when.

The approach

Each supplier registers their own crew against your access rules. Thoryn verifies credentials at the gate in real time. Build, race, breakdown - different access per phase. Event ends, access stops.

No accreditation spreadsheets · Access per phase: build, race, breakdown · Full audit trail for every restricted zone
Construction

Ten contractors on site. None of them have your systems. All of them need access.

The situation

One project. Architect, main contractor, municipality, installers, zzp'ers. All temporary, all with different companies and systems. Every week, new people arrive on site who need access to plans, zones or systems.

The problem

Access is managed manually per phase. Confidential drawings end up in the wrong hands. After handover, contractors still have access to systems they should never see again. Nobody has time to clean it up.

The approach

Every contractor logs in with their own company credentials. You set what each role can see and where they can go - per project phase. Project ends: all access revoked automatically.

No manual account management · Phase-based access per contractor role · Automatic revocation at handover

You stop managing access
for people you don't employ.

Right now, someone on your team is creating accounts for contractors, chasing revocations, and answering audit questions about who was on site when. Thoryn takes that off their plate - completely.

🔗

Contractors use their own login

No accounts to create. No passwords to issue. Each contractor logs in with what they already have - their company login, a sector credential, or a digital ID. Your IT team does nothing.

Gate open or closed - in seconds

Thoryn checks who they are, what they're authorised for, and whether that's still valid - right now, at the gate. No phone calls. No spreadsheets. No delays.

🎛️

You set the rules - Thoryn enforces them

Which zones, which roles, which phases, how long. You decide. Thoryn makes sure it happens automatically - even when 500 people show up on the same day.

📋

When the inspector asks - you have the answer

Every access event is logged and signed. Who was on site, when, through which gate, from which company. NIS2, ISPS and safety audits answered without digging through spreadsheets.

Built for external parties.
Not just your own employees.

Okta and Entra are great for managing your own staff. The moment a contractor, supplier or external crew member needs access - they break down. Thoryn is built for exactly that problem.

Capability Okta / Entra / WorkOS Thoryn
Enterprise SSO (SAML & OIDC)
Multi-organisation identity federation-
Each org manages their own people-
Automatic access revocation-
eIDAS 2.0 / EUDIW relying party-
Credential-gated physical access-
Sector credentials (BIG, UZI, ISPS, AVSEC)-
EU-only infrastructure-
CLOUD Act exposureDirectNone
NIS2 / DORA ready out of the box-
IncorporationUSNL
Go-live speedWeeks5 days

Built for sectors
where the rules are strict.

Critical infrastructure, healthcare, construction - in these sectors compliance isn't an afterthought. Thoryn is built for it from the ground up. The evidence pack is ready to hand over, not assembled after the fact.

Compliant

NIS2 Article 21

  • Controls mapped per Article 21 requirement - ready to hand to a supervisor
  • Immutable, tamper-evident audit logs for every auth and access event
  • Incident-response runbooks included out of the box
  • Evidence pack structured for regulatory audit, not internal comfort
Compliant

ISPS & AVSEC

  • Full audit trail per access event per restricted zone
  • Credential-gated physical access without PII stored on the gate device
  • Trust Registry defines which issuers are accepted per zone
  • Designed for seaport and airport security regulation requirements
Compliant

NEN 7510 (Healthcare)

  • Recognises BIG, UZI and institutional credentials out of the box
  • Automatic audit trail per record access event
  • Clear logging of who viewed what and when - per institution
  • Supports multi-institution access without centralising PII
EU-only

GDPR & Data Residency

  • All data stored on Hetzner infrastructure in Germany - no US routing
  • Dutch incorporation, no US parent company, zero CLOUD Act exposure
  • eIDAS 2.0 / EUDIW relying party - tested against NL and EU reference wallets
  • Regulated sectors must accept EUDIW by 2026 - Thoryn gets you there without a re-integration

See it working
at your gate in 20 minutes.

We're working with a first group of ports, circuits and construction firms. No lengthy rollout - we start with one gate or one project, show the value fast, and go from there.

No migration required

Thoryn connects to what you already have. External parties use their own credentials. You don't rebuild anything on either side.

Live in days

We work alongside your team for the first integration. Your first external party is logging in before the week is out.

Compliance included

NIS2, ISPS, NEN 7510 audit logs are part of the base product - not billed separately at your next renewal.

EU-only infrastructure

Dutch B.V. All data on EU infrastructure. No US parent company. No CLOUD Act exposure. Full data residency documentation available.