Flexible pricing for companies and individuals

Get lyonl for free

Protect access to federated cloud and on-premises applications with lyonl

Start building for free
Have a complex use case?

We’ll ensure your company is set up for success from day one.

Talk with an expert
Billing type
How many monthly active users?
  • Up to 7,000 External MAU
  • SDKs, IDP & Lock Screen
  • Up to 2 Social Connections
  • 1000 M2M Tokens
  • Up to 3 Rules
  • SDKs, IDP & Lock Screen
    • Up to 50,000 External MAU
    • Unlimited Social Connections
    • Custom Domains
    • Role Management
    • Up to 25 Rules
    Contact us

    Add-ons to fit your needs

    • Machine to Machine Tokens

      Enable secure access to your API from other internal or external non-interactive third party-apps with minimal configuration.

    • Premier Support

      Phone support, 24×7×365 support hours, shorter response times, and a designated team of support engineers to help you with your onboarding and ongoing experience with us.

    • Attack Protection

      Keep your users and services safe against password leaks, intruders, and scripted attacks from bots.


      We can provide compliance for several standards including HIPAA, via a Business Associate Agreement, and PCI compliant environments.

    • Enterprise MFA

      Enterprise MFA allows one-time codes delivered via SMS/voice/email, alongside with WebAuthn and push notifications.

    • Protect users everywhere with DNS‑layer security

      We deliver a fast, secure, and reliable internet experience to x small – medium-sized businesses (and counting).

    • Mobile Device Management

      Centrally provision, monitor, and secure all endpoint devices within your organization, while keeping your network aware of constantly changing devices.

    • Certificate Issuance

      Manage TLS/SSL certificate issuance for multiple individuals and teams in a fraction of the time. With role-based user access and domain pre-validation, you’ll save time with certificate management that can be put toward more critical tasks—like inspection and remediation.

    • Secure VoIP service

      Comprehensive security strategy to protect its virtual phone service and its users. Aside from high-level encryption that protects VoIP phone calls, there are other measures employed including regular data center audits, multi-factor authentication and single-sign-on for account protection, and advanced account management and administration.

    Not Sure Which Plan is Right for You?