Static preview. Do not publish before domain, trademark, legal, and form-backend blockers are cleared.

Practical identity and hosted tools for SMB IT

Identity, access, and work software without the enterprise-tier runaround.

Isoline is building managed SSO, MFA/passkeys, and RADIUS for supported apps, VPNs, firewalls, and Wi-Fi setups used by smaller IT teams, with clear packaging and focused onboarding.

Paid early access is manually approved. We support only documented configurations during the first pilots.

Users Admins & teams
Isoline Access SSO + MFA + RADIUS
Apps OIDC / SAML
Network VPN / Wi-Fi
Isoline Boards Validation track

The problem

Core access controls should not require an enterprise maze.

SMB teams need SSO for internal apps, MFA for safer logins, centralized VPN or Wi-Fi authentication, and clear user lifecycle controls. The usual options often come with confusing license dependencies, expensive feature gates, or self-hosting work your team does not have time to own.

SSO sits behind the wrong tier.
MFA and passkeys are bundled into plans you did not ask for.
RADIUS support is treated like an enterprise add-on.
Microsoft licensing is hard to predict.
Self-hosted identity stacks become another system to patch, monitor, and explain.

Product direction

Start with access. Add managed tools when they help.

Isoline starts with identity and network access because those are the systems that decide who gets into your apps, VPNs, firewalls, and Wi-Fi. The same identity foundation can later connect to managed tools such as Isoline Boards, but each product stands on its own.

Isoline Boards Validation track

Managed project boards with SSO included.

A separate managed project/work product based on a hosted Plane path, intended for teams that want project boards without self-hosting and without SSO being locked behind enterprise packaging.

  • Managed project/workspace hosting after validation.
  • SSO included through the validated OIDC path.
  • Suite IdP preferred, customer-owned OIDC supported where practical.
  • Backup and restore only after the restore path is tested.
  • Separate packaging from Isoline Access.

Isoline Boards is not sold until license, SSO, backup/restore, and operating-cost validation are complete.

Why Isoline

Built for teams that need IT to work, not another platform to babysit.

01

Clear scope

We publish what is supported and avoid pretending every device and edge case is covered.

02

Managed operation

We run the infrastructure-heavy pieces so your team is not patching identity and RADIUS components at night.

03

Predictable packaging

Core access features should not be hidden behind enterprise-only plans.

04

EU-first posture

Hosting and operations start with EU-first assumptions.

05

Practical support

Business-hours support with focused onboarding for early-access customers.

Early access

Early access is for real access projects, not vague beta testing.

We are looking for SMB IT teams with a concrete SSO, VPN/firewall, Wi-Fi, MFA, or RADIUS need. The first pilots are paid early access with a manually approved trial path, narrow configuration scope, and clear emergency-access expectations.

Good fit

  • You manage IT for a small or mid-sized team.
  • You have a real app SSO, VPN/firewall, Wi-Fi, or RADIUS project.
  • You can name the devices, apps, and user groups involved.
  • You can keep emergency admin or network access outside the pilot.
  • You are willing to give direct feedback on setup, docs, pricing shape, and support.

Not a fit yet

  • You need 24/7 emergency support before early access.
  • You require SOC 2, ISO 27001, or custom procurement before a pilot.
  • You need universal RADIUS device support from day one.
  • You need a large bespoke migration before proving the new setup.

Pricing direction

Pricing will be transparent, not tricksy.

Final prices are still being validated. The working direction is flat user-band tiers for Isoline Access, with SSO, MFA/passkeys, and validated RADIUS capabilities included instead of split across artificial feature gates.

  • No extra charge just to enable SSO.
  • No extra charge just to require MFA.
  • No per-login or per-RADIUS-auth pricing.
  • Add-ons should reflect real support or operating cost.
  • Isoline Boards is packaged separately unless a deliberate bundle is introduced later.

Questions

What early customers usually need to know.

Is Isoline a replacement for Microsoft Entra or JumpCloud?

For some SMB use cases, the goal is to cover practical access controls without the same packaging complexity. It is not an enterprise IAM platform at launch.

Which RADIUS devices are supported?

Only devices and configurations that are tested and documented. The first matrix is expected to focus on VPN/firewalls and Wi-Fi APs or controllers. We will not claim universal RADIUS or EAP support.

Do you support 24/7 access emergencies?

No. Early access includes business-hours support. Customers must keep emergency access paths outside Isoline during evaluation.

Is Hosted Plane available now as Isoline Boards?

Not yet. Isoline Boards remains a validation track until license, SSO, backup/restore, and deployment-cost questions are closed.

Is this self-hosted software?

No. The value is managed operation. We may use open-source components where appropriate, but the customer should not need to run the hard parts.

Where is Isoline hosted?

The working posture is EU-first hosting and operations. Final region, subprocessors, data retention, and legal terms still need to be documented before paid launch.

Is this compliance-certified?

No public compliance certifications are claimed for early access. Security basics matter from the start, but formal certifications such as SOC 2 or ISO 27001 are not launch claims.

Request early access

Bring one real access problem.

If your team needs SSO, MFA/passkeys, or RADIUS without enterprise-tier packaging, tell us what you are trying to connect and what would make a pilot worth paying for.

Static preview: wire this form to the selected CRM, email, or backend before publishing.