Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

DAASI International GmbH of the it-sa 365
default Stage Background
Exhibitor
Service

Hall 7A - Booth Number 7A-326

DAASI International GmbH

Connecting IDeaS through open source

About us

south_east

Floor plan

south_east

Employees

south_east

Products

south_east

Actions

south_east

We offer

  • Open source (software and services)
  • Identity and access management
  • User (rights) management
  • Data protection, data security

Industry

  • Small and medium-sized enterprises
Europaplatz 3
72072 Tübingen
Germany

About us

DAASI International is an expert in (federated) identity and access management, exclusively using open source technology. Since it was founded in 2000, the IT service provider from Tübingen, Germany deals with identity management, access control and directory service technologies for universities, public authorities and companies. Additionally, DAASI International is actively involved in the field of digital humanities and participates in national and international research projects.

DAASI International’s range of services covers consulting, support, hosting, and software development, as well as (individualised) trainings.

DAASI International is a strong advocate for digital sovereignty and thus upholds open source, interoperable protocols and privacy.

  ... read more

Floor plan

Keywords

open source | IdM | IAM | digital sovereignty | digital identity | access control

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.