The New Era of Identity and Access Management for On-Premise Security Systems

Our new Identity and Access Management (IAM) platform makes it easy to manage what your users can see and do in The Boring Toolbox with role-based permissions, SSO, and MFA.
Table of Contents

Let’s face it—identity and access management in most systems is a nightmare. Complicated, insecure, and prone to over-permissioning. We all know the drill: username, password, maybe MFA, and hope for the best. But with more teams, more data, and more risks, that just doesn’t cut it anymore.

But here’s where we come in.

At The Boring Lab, boring isn’t about being uninspired—it’s about being essential, reliable, and quietly powerful.

So, we took one of the most neglected, overlooked aspects of video system management… and made it so much better.

Introducing Identity Access Management (IAM) for The Boring Toolbox

A modern, secure authentication experience for The Boring Toolbox—designed specifically for video surveillance teams

Boring’s new Identity Access Management (IAM) platform brings cloud-grade login and access controls to your on-prem system.

This means you get the security and flexibility of modern identity management—without the need to move your system to the cloud.

Here’s how IAM makes managing access easier, safer, and more efficient:

  • True Multi-Factor Authentication (MFA)
  • Role-Based Access Control (RBAC) with centralized role assignment and additive permission logic
  • SSO support for all major identity providers (including Entra, Okta, Google, SAML, and OpenID)
  • Auto-provisioning with SCIM
  • Clean separation from Milestone authentication
  • Easier team management (without over-permissioning anyone)
  • Unlimited users
  • Email-based invites and link-based registrations

The Boring Toolbox’s IAM is an optional user management system for teams that want more control, easier onboarding, and future-ready permissions.

Your VMS stays on-prem—but your login process gets smarter.

Still using Milestone authentication? No problem.

It’s fully supported and remains a great option for air-gapped environments or specific compliance needs.

But if you’re ready for a simpler, more scalable way to manage access and permissions for your team, IAM gives you the tools to do it.

Give The Right People The Right Access

No more giving someone admin access just to view a dashboard. 

With our new IAM platform, you can give each person exactly the access they need—and nothing more—minimizing risk, simplifying onboarding, and streamlining workflows.

With IAM enabled, you can assign roles like:

  • Administrator: Full access to everything, including role management and system settings
  • Dashboard Viewer: View health monitoring dashboard only
  • Site Manager: Manage cameras, site settings, reports, and maintenance
  • Password Manager: View and update passwords only
  • Site Viewer: View-only access to cameras, devices, and snapshots

Roles are additive—so if someone needs more than one capability, you can stack permissions to match.

Save Time with Permission Groups

If you know us, you know we love bulk actions!

That’s why we kept our big teams top of mind when we created permission groups. So when it’s time to onboard 20 people from a single site, you won’t bat an eye.

You can create permission groups for specific teams like:

Site Managers at North Campus ➜ Role: Site Manager

Facilities Team ➜ Role: Dashboard Viewer

IT Security Lead ➜ Role(s): Password Manager + Dashboard Viewer

What Happens If BAM Expires?

IAM requires an active Boring Annual Maintenance (BAM) plan.

If it expires, users will still be able to log in, but they’ll lose visibility until BAM is renewed or Milestone authentication is re-enabled.

The good news?
Your IAM data, roles, and permissions will be saved—ready to pick up where you left off.

Why Identity Access Management Matters

Most teams manage access the same way they did 10 years ago—either everyone’s an admin, or no one is.

And let’s be real: with complex systems and growing teams, that just doesn’t cut it anymore.

But this isn’t just about making identity and access management simpler and more secure.

It’s about giving you the tools to:

  • Share dashboards without over-permissioning
  • Simplify user management for large and scaling organizations
  • Future-proof your environment for new integrations and workflows

SSO is just the start.

Soon, you’ll be able to connect The Boring Toolbox with external ticketing platforms, helpdesk tools, and other add-ons designed to improve your daily workflows.

So even if you don’t need role-based permissions today, activating Boring IAM sets you up for everything that’s coming next.

Ready to streamline your access management?

Let’s get you started with Identity Access Management for The Boring Toolbox today.

You’ll need to update your Boring Toolbox to version 6.0 or later. Then, just head to Settings → Authentication to get started.

If you’re not using The Boring Toolbox yet, you can start a 30-day free trial to see what all the buzz is about.

Because even the boring stuff deserves to be great.

Want to be notified when new add-ons are released? Join the waitlist.

It’s the newsletter security professionals use to work smarter. We promise you’ll learn stuff and enjoy a few blissful moments of productive procrastination.

Team Boring

Your go-to XProtect eXPerts. We learn the technical stuff that will save you time and make it less boring.

Team Boring

Your go-to XProtect eXPerts. We learn the technical stuff that will save you time and make it less boring.

You Might Also Enjoy…