Cybersecurity_

Identity management systems



For a complex organisation which uses a multitude of IT systems and a heterogeneous working environment, identity management is of key importance for the security of the data it stores and for its ability to protect it against unauthorised access.

 

Matic offers solutions with the following features:

  • single sign-on, a user-friendly authentication solution (users only need to log in once to gain access to all the systems they work on),

  • centralised user management for third-party applications,

  • automated password propagation,

  • automated access clearance and blocking for multiple systems, controlled from a single location

  • access control for selected applications on a per-user and per-group basis,

  • capability to expand the set of available features based on a well-documented framework,

  • support for diverse integration protocols and technologies (e.g. SOAP, REST, JAVA),

  • ability to integrate in-house cryptography solutions for password management,

  • user and login management (adding, viewing, filtering, editing, disabling (deleting), unblocking),

  • managing user authentication information (e.g. password changes, password parameters),

  • managing user roles (identities) and granting privileges,

  • organising users into directories and structures (included embedded ones) that reflect the structure of the organisation to facilitate user management; assigning users to groups,

  • role management (adding, deleting, viewing, filtering, creation of hierarchies and structures of privileges),

  • assigning roles and privileges to users and groups,

  • integrating with other LDAP servers, e.g. Microsoft Active Directory, Sun, eDirectory, Directory Serve,

  • integrating or importing legacy user repositories.

 

 

Value for Customer:

 

Matic offers best-in-class identity management solutions. As part of the implementation project, Matic consultants recommend practical solutions, ensuring a number of benefits for your organisation. You will be able to:

  • Reduce the number of staff with broad access to multiple systems which they do not need to do their work,

  • Improve the password policy and role assignment by centralising that type of functionality, instead of managing it in each isolated and dispersed systems separately,

  • Reduce the number of active accounts upon employees leaving the company or changing roles,

  • Ensure faster response to security incidents,

  • Relieve the IT department by eliminating the workload related to user access management.

 

 

PARTNERS:

PL / EN / RU