Practical identity and hosted tools for SMB IT
Identity, access, and work software without the enterprise-tier runaround.
Isoline is building managed SSO, MFA/passkeys, and RADIUS for supported apps, VPNs, firewalls, and Wi-Fi setups used by smaller IT teams, with clear packaging and focused onboarding.
Paid early access is manually approved. We support only documented configurations during the first pilots.
The problem
Core access controls should not require an enterprise maze.
SMB teams need SSO for internal apps, MFA for safer logins, centralized VPN or Wi-Fi authentication, and clear user lifecycle controls. The usual options often come with confusing license dependencies, expensive feature gates, or self-hosting work your team does not have time to own.
Product direction
Start with access. Add managed tools when they help.
Isoline starts with identity and network access because those are the systems that decide who gets into your apps, VPNs, firewalls, and Wi-Fi. The same identity foundation can later connect to managed tools such as Isoline Boards, but each product stands on its own.
Managed identity and RADIUS for practical SMB IT.
Configure supported OIDC and SAML apps, MFA/passkeys where available, and RADIUS authentication for tested network configurations without operating the identity stack yourself.
- SSO for supported apps through OIDC and SAML.
- MFA/passkey setup through the selected identity engine.
- Dedicated customer org for early tenant isolation.
- RADIUS authentication for tested VPN, firewall, or Wi-Fi configurations.
- RADIUS accounting and EAP support after validation gates pass.
- Business-hours onboarding and email support.
We do not claim universal device support. Early access covers only explicitly tested configurations.
Managed project boards with SSO included.
A separate managed project/work product based on a hosted Plane path, intended for teams that want project boards without self-hosting and without SSO being locked behind enterprise packaging.
- Managed project/workspace hosting after validation.
- SSO included through the validated OIDC path.
- Suite IdP preferred, customer-owned OIDC supported where practical.
- Backup and restore only after the restore path is tested.
- Separate packaging from Isoline Access.
Isoline Boards is not sold until license, SSO, backup/restore, and operating-cost validation are complete.
Why Isoline
Built for teams that need IT to work, not another platform to babysit.
Clear scope
We publish what is supported and avoid pretending every device and edge case is covered.
Managed operation
We run the infrastructure-heavy pieces so your team is not patching identity and RADIUS components at night.
Predictable packaging
Core access features should not be hidden behind enterprise-only plans.
EU-first posture
Hosting and operations start with EU-first assumptions.
Practical support
Business-hours support with focused onboarding for early-access customers.
Early access
Early access is for real access projects, not vague beta testing.
We are looking for SMB IT teams with a concrete SSO, VPN/firewall, Wi-Fi, MFA, or RADIUS need. The first pilots are paid early access with a manually approved trial path, narrow configuration scope, and clear emergency-access expectations.
Good fit
- You manage IT for a small or mid-sized team.
- You have a real app SSO, VPN/firewall, Wi-Fi, or RADIUS project.
- You can name the devices, apps, and user groups involved.
- You can keep emergency admin or network access outside the pilot.
- You are willing to give direct feedback on setup, docs, pricing shape, and support.
Not a fit yet
- You need 24/7 emergency support before early access.
- You require SOC 2, ISO 27001, or custom procurement before a pilot.
- You need universal RADIUS device support from day one.
- You need a large bespoke migration before proving the new setup.
Pricing direction
Pricing will be transparent, not tricksy.
Final prices are still being validated. The working direction is flat user-band tiers for Isoline Access, with SSO, MFA/passkeys, and validated RADIUS capabilities included instead of split across artificial feature gates.
- No extra charge just to enable SSO.
- No extra charge just to require MFA.
- No per-login or per-RADIUS-auth pricing.
- Add-ons should reflect real support or operating cost.
- Isoline Boards is packaged separately unless a deliberate bundle is introduced later.
Questions
What early customers usually need to know.
Is Isoline a replacement for Microsoft Entra or JumpCloud?
For some SMB use cases, the goal is to cover practical access controls without the same packaging complexity. It is not an enterprise IAM platform at launch.
Which RADIUS devices are supported?
Only devices and configurations that are tested and documented. The first matrix is expected to focus on VPN/firewalls and Wi-Fi APs or controllers. We will not claim universal RADIUS or EAP support.
Do you support 24/7 access emergencies?
No. Early access includes business-hours support. Customers must keep emergency access paths outside Isoline during evaluation.
Is Hosted Plane available now as Isoline Boards?
Not yet. Isoline Boards remains a validation track until license, SSO, backup/restore, and deployment-cost questions are closed.
Is this self-hosted software?
No. The value is managed operation. We may use open-source components where appropriate, but the customer should not need to run the hard parts.
Where is Isoline hosted?
The working posture is EU-first hosting and operations. Final region, subprocessors, data retention, and legal terms still need to be documented before paid launch.
Is this compliance-certified?
No public compliance certifications are claimed for early access. Security basics matter from the start, but formal certifications such as SOC 2 or ISO 27001 are not launch claims.
Request early access
Bring one real access problem.
If your team needs SSO, MFA/passkeys, or RADIUS without enterprise-tier packaging, tell us what you are trying to connect and what would make a pilot worth paying for.