Authentication Manager

Authentication Manager

Validate that a user is who they claim – depending on the sensitivity of the resource, enabling the right level of identity verification with multiple authentication mechanisms from simple user ID and password, to multifactor authentication as well as risk-based authentication which consider contextual factors such as device, geo-location, time and more.

Reduce Risk

Reduce risk

Reduce the risk that your enterprise is exposed to as your external user populations grow, become more widely distributed and complex.

Protect

Protect

Protect your enterprise systems and be certain that your data is never compromised using advanced authentication capabilities.

Validate

Validate

Validate and verify all user identities against real-world information sources, such as their social security number or employee ID, and establish trust across domains.

Features

ID/password

Supports the end-user entry of credentials in the form of a user ID and password when making a request to access an application or resource.

Multi-factor

MFA supports a wide-range of multi-factor authentication options, including SMS text message, email, and phone call, one-time passwords and more.

Risk-based authentication

For high-sensitivity resources, risk-based authentication (RBA) is used to detect and manage authorizations. Risk-based authentication can identify scenarios such as when a user is authenticating from an unknown device, location, outside of normal time parameters, and more. The scenarios are defined by control triggers, which can be used to configure system actions according to customer preferences.

Identity verification

For security administrators responsible for creating new user accounts or making changes to existing user profile information, e.g. issuing a new password – this enables security administrators to verify information with end-users against a real-world information source, such as their social security number or employee ID.

Single sign-on

Single sign-on provides user access to multiple applications with one authentication process.

Password policies

Policies include facilities for defining and enforcing customer password policies such as password length, age, and complexity.

Translations & mappings

For large distributed application ecosystems, this provides rich identity brokering capabilities to efficiently connect IDPs and SPs in a many-to-many relationship model. Services include cross-domain single sign-on, standard federation protocol support, translation and mapping between different federation protocols, IDP and SP connection management, and custom protocol support.

Security token service

Setting up your own PKI is one of the most complex and expensive security challenges enterprise IT will face. Covisint provides comprehensive services for issuing security tokens for access requests to secure software applications/relying parties. Instead of the application authenticating the client directly, the client is redirected to the Platform, which authenticates the client and issues a security token.

Federation protocols

As applications use a variety of application protocols, this supports all standard federation protocols including SAML, WS-Federation, and many other custom legacy federation interfaces.

Identity Manager

Identity Manager

Designed for comprehensive identity and access management across the complex ecosystem of enterprise identities.

Authentication Manager

Authentication Manager

Validate that a user is who they claim to be, and establish trust across domains for single sign on.

Identity Intelligence

Identity Intelligence

Inspect identity, access and endpoint data then convert it to actionable information and insight.

Directory Services

Directory Services

Cloud-based directory and the tools to integrate and synchronize directories.