Authentication Manager

Authorization Manager

Establish access and authorization administration, delegation and policy management framework.

Reduce Risk

Reduce Risk

Reduce the risk that your enterprise is exposed to as your external user populations grow, become more widely distributed and complex.

Protect

Protect

Protect your enterprise systems and be certain that your data is never compromised using advanced authentication capabilities.

Validate

Validate

Validate and verify all user identities against real-world information sources, such as their social security number or employee ID, and establish trust across domains.

Features

Attribute-based Authorization

Attribute-based authorization based on authorization policy framework provides API-based and automated access management for delivering personalized user context.

Authorization Policy Framework

The Authorization Policy Framework is the authorization security layer that acts as the gatekeeper for access to protected resources delivering a highly performing dynamic security context.

Multi-protocol Support

Efficiently connect IDPs and SPs in a many-to-many relationship model with cross-domain SSO, support for all standard federation protocols including SAML, WS-Federation, custom legacy federation interfaces and translation and mapping between different protocols.

Delegated Administration

User access management can be performed by designated administrators within or outside the organization, by administrators in higher-tier organizations, or by application/service owners with full audit and audit enforcement.

Audit and Attestation

Constant change in employee and external user status requires audit and attestation to ensure proper access at all times. For internal and regulatory compliance, periodic notification of administrators requiring a review of their assigned users to ensure that each user’s status and access rights are correct.

Workflows and Delegation

User self-service application requests that trigger a standard, configurable workflow. Once an organization has been granted access to a particular application, users within that organization may request access triggering a notification to their administrator to approve/deny the request. Upon completion, the requesting user is notified of the decision.

Centralized Access Management

Deep functionality for managing access to services and applications via hierarchical authorization rules with delegation. Services can be configured with multi-step approval workflows.

Secure Token Service

Issue security tokens for access requests to secure software applications/relaying parties. Instead of the application authenticating the client directly, the client is redirected to the Platform, which authenticates the client and issues a security token.

Identity Manager

Identity Manager

Designed for comprehensive identity lifecycle and access management across the complex ecosystem of enterprise identities.

Authentication Manager

Authorization Manager

Establish access and authorization administration, delegation and policy management framework.

Identity Intelligence

Identity Sync, Analysis & Intelligence

Aggregate, synchronize, inspect and analyze identity, access and end-point data – then convert it to actionable information and insight.

Directory Services

Identity Event Streaming Engine

Cloud-based directory and the tools to integrate and synchronize directories and identity-related data.