i-doit: Your central information hub

With i-doit, companies have at their disposal a software solution that enables them to set-up a CMDB using open-source software. At the same time, by implementing i-doit, companies also have the opportunity to map out their ITIL processes and establish and build a comprehensive service management structure. The data captured can also be used to form the basis for a successful configuration, problem and event management system.


i-doit – Your most important areas of use:




i-doit Projects

Would you like us to help you successfully implement your own i-doit project? Or perhaps you would like to buy i-doit licences?

We also implement i-doit in non-IT sectors such as in hospitals for managing assets or with alternative energy producers who want to better manage their wind turbines and components.


"Our IT infrastructure documentation and management is based on i-doit. Its performance under actual working conditions is what really sold us!"

Combining IT documentation with system monitoring and service management

i-doit / openITCOCKPIT Connector

The openITCOCKPIT / i-doit Connector makes setting up a monitoring system significantly easier. Once a system has been entered into the CMDB, it is automatically included in the monitoring process. After the user has added all relevant assets to the i-doit database, all applicable objects can then be exported. Templates for carrying out checks are automatically assigned by the interface as part of the installed software recognition process. The i-doit group assignment function for CIs (configuration items) can then be used to manage the selected import of these items via profiles. Further information about the i-doit /openITCOCKPIT Connector

i-doit / ((OTRS)) Community Edition Connector

Good service and incident management requires that information is available as quickly as possible. So in the event of an incident, it is important to know which configuration item (CI) is affected. With the help of the connector developed by it-novum, it is possible to automatically provide relevant information for the service desk in the ticket system Znuny. More information about the i-doit / Znuny Connector

i-doit and it-novum

For many years, i-doit and it-novum have had a close and successful working partnership. Together during this time they have realised numerous projects with both medium-sized companies and international corporations. As a result, an enormous amount of expertise has been gained in the implementation of CMDB solutions. It-novum has also developed bi-directional interfaces to ensure you can make the most of the synergies gained between i-doit and your monitoring solutions, ticketing systems and/or inventory software.

Stephan Kraus
Director IT Service Management

We support you with your i-doit documentation project

The benefits of i-doit

Flexibility in customization

A very important feature of any good CMDB is that it should give you the ability to define how you structure your assets (these are referred to as objects in i-doit). And exactly this can be done in i-doit. Using i-doit, you can achieve a very high degree of granularity when deciding which categories are important to you and which aren’t.

Always in the picture reporting with i-doit

Maintaining your infrastructure data is one thing. Actually having a comprehensive overview of this information, however, is another. Using the native i-doit reporting function, you can produce very detailed reports about all aspects of your system. This means users can include every value maintained in the i-doit system.

It security with the VIVA module

With VIVA, an information security management system, ISMS for short, can be built up from the existing data in i-doit’s CMDB. This is a list of procedures and rules within a company that permanently define, control, maintain and continuously develop information security.
The VIVA module is based on the BSI IT-Grunschutz (German Federal Office for Information Security’s IT baseline protection approach), which supports ISO 27001 certification. However, it is not possible to import an ISO 27001 catalog directly.

Features of i-doit

Technical documentation

With i-doit, you can produce highly detailed representations of your entire IT infrastructure in your IT documentation. Just start by creating a layout of your rooms and setting up graphical rack views. Then move on to detailing all your hardware (servers, clients, active and passive network elements, applications and database systems). Finally, you can add graphical depictions of complex system structures such as virtualisations, clusters or SANs. In total, you have around 40 different object types you can use to represent all your common elements and devices. Should it not be possible to correctly illustrate an object, you can also use your own defined object types.

Network documentation

A large part of your network documentation is dedicated to describing network structures. With i-doit, you can easily describe electricity as well as data networks. Both have active and passive elements, cables, power sockets and wiring cabinets. Working with these elements, it is possible to achieve a high degree of detail (from Layer 2 to Layer 7 of the OSI model) in your IT documentation. The system makes it easy to enumerate IP addresses (v4 and v6) as well as depict port, WAN and VLAN structures for active communication links. And particularly when it comes to IP networks, i-doit gives you the ability to comprehensively administer all the ranges at your disposal.

Licences and contracts

In addition to technical data, i-doit also provides the ability to capture and manage administrative information. It makes no difference whether it’s purchasing or depreciation information for accounting purposes, inventory data, maintenance and service contracts, service certificates or software licences. This management information can easily be assigned to individual assets and applications. And i-doit supports administrators by keeping an active count of all licences being used. By using threshold values and notifications, i-doit can, for example, make admins aware of expiring contracts before crucial action needs to be taken.


Experts will tell you any good CMDB solution includes the ability to produce comprehensive and reliable reports. With i-doit, you can easily produce the reports you need using the built-in graphical query editor, because content is controlled and guided using conditional blocks. If, however, this does not provide the level of control or granularity you require, you can switch to the integrated SQL editor and carry out your own database queries, tailoring the response data as needed. You can even export your reports into various formats for further use and dissemination.


i-doit can also be configured so that events will trigger automatic email alerts – for example, when threshold values have been reached for licence / notice periods or when the system registers a change in status. Data for potential recipients can also be provided by linking to an Active Directory structure.


With the CMDB Explorer, administrators can display certain technical assets in a graphical overview that clearly lays out dependencies, relationships and affiliations. Thus, it is relatively easy to depict an entire network structure or virtualisation environment.

Import / Export

With i-doit, it’s not only possible to export current data for use in other programs, the system also includes extensive functions for importing previously sorted and maintained data. CSV and Excel tables are also not a problem: Profiles, field mapping and validation functions for importing complex source data are always available for use.

Event management

Using the event management feature, it is possible to launch automated processes directly from documentation. There is practically no limit to the possibilities this affords you: the automatic provisioning and deletion of virtual machines, the initiation of software installations or the creation of monitoring objects.

Log book

A more important reason for implementing a CMDB is that this will ensure that data captured via the i-doit logbook is secure and cannot be tampered with: Any and all changes made in the documented objects in i-doit are logged and saved.
A comments function can also be activated, which requires each user to provide information about any changes made.
Import processes, modules and interfaces also use the logbook for tracking changes.


Using an appropriate licence, multiple customers can be created as clients in i-doit. This gives each customer his own i-doit instance with corresponding individual access points. This ensures data security by only allowing customers to access their own data and blocking access to that of other clients in the system.

Implement IT documentation correctly from the start

Our practical guide accompanies you through the preparation and implementation phases. Checklist included!

Request whitepaper now