Features

Topic Features Benefits
Password Management
  • Password synchronization across managed systems
  • Strengthened password security
  • Central policy administration to control composition, password generation, etc.
  • Password aging and reset
  • Allows users to maintain a single password across all systems, which reduces the need to remember multiple passwords.
  • Improves end user productivity by reducing the number of passwords to remember
 Self Service
  • Self Service enables end users to manage their profiles and passwords
  • White pages functionality
  • “Forgot password” functionality”
  • Improves end user productivity
  • Reduces help desk volume
Provisioning
  • Identity life cycle management
  • Automatic provisioning
  • GUI based workflow modeling
  • Request / Approval functionality
  • SPML 2 compliant connectors
  • Automatic provisioning, re-provisioning, and de-provisioning of users and resources
  • Improves security by ensuring access is granted and removed as needed
  • Improved end user productivity
  • Reduces operational cost.
 Role Management
  • Role lifecycle management
  • Requests, approval process to define new roles and update existing roles
  • GUI based workflow process definitions for approval processes
  • Role lifecycle reporting
  • Periodic review and adaptation of role model to business needs
  • Request, review, approval, and assignment of users to roles
  • Integration of job Roles with identity lifecycle improves alignment between business and IT
  • Improves compliance and enforcement of IT controls.
  • Reduces cost of audits
  • Auditor Policy to confirm that IT Roles are provisioned correctly
Entitlement Management
  • Automatic provisioning fine grained entitlements across managed systems
  • Leverages provisioning and role management components
  • Improves compliance by providing necessary access to data in audits
  • Ensure the access is granted to only appropriate users.
Audit and Compliance
  • Fine grained audit control across architecture
  • Provides comprehensive framework for establishing access control compliance
  • Reduced costs for provisioning and identity auditing
  • Automated reviews and proactive scanning, consistent enforcement and repeatable processes
Synchronization
  • Enables synchronization between a source system and the target systems that are managed by the identity manager
Reconciliation
  •  Detects changes in the target system and synchronizes them with the other target systems. Also detects orphans.
Delegated Administration
  •  Allows the administrator to delegate certain rights to other users based on a set of rules.
Recent Posts
Cortlandt Manor, NY: OpenIAM announces version 3.5 of the Identity and Access Governance solution. The new release improves upon the previous version by offering better performance and scalability, improved flexibility, and better tools for operational support. Some of the new...
CORTLANDT MANOR, NY JUNE 21, 2016: OpenIAM, a top Open Source Identity and Access Management vendor, has bolstered security at organizations while increasing employee productivity through its automated Self-Service Portal. In lieu of calls to the help desk due to...
OpenIAM Profiled in CIO Review
This month, OpenIAM was featured in the technology magazine CIO Review.
Many of our Identity Management customers have a Microsoft Environment which consists of Microsoft Active Directory and complementary components such as Microsoft Exchange, Lync, SQL server, etc. Many of these customers have, or are in the process of adopting Microsoft’s...
See
More
Posts
read more
Sign in
Register
or
Lost your password?
Register

Products of Interest

How did you hear about us?

Registration confirmation will be emailed to you.