This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Authentication
More than 30 IDM realisations in the Czech Republic and abroad
Privileged Access Management
Management and security of accounts with high level of permissions
Solving the question “Who guards (access to) the guard?”
Strong multi-factor authentication
Password lifecycle management
Logging activity in open sessions
SSO for access to systems
Together with IdM (authorization) forms a complete admin account management
Support for GDPR, ZoKB
Access Management
Managing user access to information resources
Ability to use two or more factors to verify identity
MFA by location, time, non-standard frequency or combination of accesses, etc.
SSO – use of a single login (e.g. to AD/LDAP) for automatic login to other systems/applications
Together with IdM, they form IAM – complete access and permissions management to systems and applications in the organization
Support for GDPR, ZoKB
Multi-Factor Authentication
A method of authenticating a user to a system or service by multiple, independent factors
Multi-Factor Identity Authentication (MFA)
A method of authenticating a user to a system or service by multiple, independent factors
It generally consists of something the user knows (password, personal information), something the user possesses (hardware token, mobile phone, ID card), and something that represents the user’s physical identity (fingerprint, retina scan, voice, DNA)
Customer Identity and Access Management
Identity management of customers who need access to customer portals/information systems
Based on permissions, rights are automatically assigned to parts of systems, applications
CIAM systems typically provide a combination of features including authentication with dynamic assignment of authorization rules (PBAC/ABAC access) for customer registration, self-service account management, consent, and preference management, single sign-on (SSO), multi-factor authentication (MFA), access management, directory access definitions and data access control