• Download a trial
  • Sales
  • Support
  • Login
logo
  • Home
  • Products
  • Solutions
  • Partners
  • About Us
  • Consulting
  • Resources
Request a Quote
  • Workforce Identity
  • Customer Identity
  • Comparison
  • Subscriptions

All Features

Overview of all features in Workforce Identity

User Onboarding and Offboarding

Automate joiner, mover, leaver processes

Access Request

Access requests with multi-step approvals

User Access Reviews

Save time with user access reviews

Self-Service Portal

Self-service portal for all end user activities

Segregation of Duties

Detect and remediate SoD violations

Password Management

Enforce password policies and enable synchronization

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Authentication and MFA

Improve security with adaptive authentication and MFA

3rd Party IdP Integration

Integrate with your existing identity provider

Integration API

Use the REST API to add identity into your applications

Connector Library

Integrate on-premise and SaaS applications

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Workforce Identity Concepts

All Features

Overview of all features in Customer IAM

Authentication and MFA

Improve security with adaptive authentication and MFA 

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Password Management

Enforce password policies and enable synchronization

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Customer Identity Concepts

Community vs Enterprise

Summary of the differences between the Community and Enterprise editions

Subscription Benefits

Overview of the benefits provided by an OpenIAM subscription

  • Integrations
  • Verticals
  • Workforce Use Cases
  • CIAM Use Cases
  • Compliance

Active Directory

Manage identity in Active Directory

Azure (O365)

Manage identity in Office365

SAP

Manage identity in SAP S/4 Hana

SAP SuccessFactors

Manage identity in SAP SuccessFactors

Workday

Manage identity in Workday

Education

Manage identity for students, staff and alumni

User Access Requests

Empower end users and improve compliance with user access requests

Strong Authentication

Improve security with adaptive authentication and MFA

Single Sign-On (SSO)

Improve customer experience with SSO

NIS2

Achieve compliance with the EU directive for cybersecurity frameworks.

DORA

Comply with the Digital Operational Resilience Act for the EU.

HIPAA

For healthcare organizations seeking HIPAA compliance.

  • Partners

Current Partners

Our Current Partners

  • About Us

About OpenIAM

Learn about OpenIAM

Press Releases

References to OpenIAM press releases

OpenIAM in the Media

References to OpenIAM in the media

Careers

Learn about open positions at OpenIAM.

  • Consulting

Proof of Value

Customized engagement to confirm defined proof of value objectives

Jump Start

Customized engagement to rapidly deliver a solution into production

Solution Implementation

Engagement with the objective to deliver a complete IAM solution based on customer requirements

  • Resources

Videos

Collection of videos describing how OpenIAM can be used to solve common use cases

Community Portal

Collaborative community portal to learn more about OpenIAM

CE Documentation

Documentation for the Community Edition

Blog

Musings on identity penned by the OpenIAM team

Webinar Calendar

Upcoming webinars and training sessions

Workforce Identity Concepts

Customer Identity Concepts

Improving Security for Remote Workers with IAM

December 21, 2023
Ameet Shah

The COVID pandemic has accelerated the shift to a remote work or hybrid work environment. According to recent research, it is estimated that by 2030 there will be a 30% increase in the number of remote workers. In the absence of an arduous daily commute, employees now contribute a decreased carbon footprint due to reduced auto and public transit; in some cases, this reduction can be up to 80 percent. With the flexibility of creating schedules to accommodate the most effective working hours, remote workers enjoy a boost in productivity. As we have seen during the last couple of years, the work-from-home model is moving toward a state of permanence.

While the benefits have been plentiful, the workforce transformation has introduced new challenges in enforcing security. The challenges stem from the following factors:

  • Potential lack of transparency around where workers are actually working from
  • Working outside of the traditional corporate infrastructure
  • BYOD computing may introduce unprotected endpoints which may not comply with company security protocols. When combined with poor password hygiene the risk only increases significantly.
  • Potentially, bad actors could gain access to these unsecured devices to perform an account take over and wield unlimited access to sensitive data.

These conditions necessitate a robust and fast method of authentication and authorization to enable remote workers to securely connect to applications, networks, and databases. OpenIAM provides a number of features that can help remote workers interact with corporate resources safely. As a first step, OpenIAM’s Identity Governance functionality can be leveraged to ensure that only the right level of access has been provided for each user at the right time. This foundational step will help manage what a user can gain access to.

RADIUS integration

For organizations that already have a VPN infrastructure in place, OpenIAM provides RADIUS-based authentication. VPNs such as Fortigate can be integrated with the RADIUS service in OpenIAM to allow VPN users to transparently authenticate against OpenIAM in the background. The benefits of this approach are that it allows organizations to take advantage of the following functionalities in OpenIAM:

  • MFA and adaptive authentication
  • Existing user stores for authentication
  • Centralized auditing

Credential provider

The credential provider from OpenIAM replaces the default authentication interfaces on Windows desktop, server and MacOS. This functionality has been a part of OpenIAM for many years. Initially, it was largely used by admins to improve security while logging into Windows.

During the pandemic, we have seen customers take advantage of the credential provider to improve the security associated with remote workers. The credential provider is configured to authenticate against the OpenIAM IdP; in doing so, a variety of functionalities are introduced while authenticating into Windows or MacOS:

  • MFA
  • Adaptive authentication flows so that you can evaluate factors such as device registration, device serial number, geo-location, role, etc.

At one of our customers where users are issued corporate laptops, each user’s profile is updated with the laptop’s serial number in OpenIAM during the laptop build process. When users authenticate, the system validates that they are using the laptop that was issued to them. It also checks where the user is located. Evaluating these two factors along with using MFA (the OpenIAM mobile app with push notification) significantly improves the security surrounding authentication. Customers are not limited to the OpenIAM app — they can also leverage FIDO 2 authentication, OTP over SMS, e-mail or IVR in their desktop authentication.

In the event the user has forgotten their login credentials, the credential provider also exposes the self-service password reset functionality in OpenIAM allowing users to help themselves and improve productivity while reducing the number of help desk calls.

Summary

The shift to a distributed workforce has brought about a myriad of benefits while also introducing concerns. OpenIAM provides a credential provider and integration with RADIUS to address the precarious security challenges that accompany the work-from-home model and has a long-term commitment to further secure remote workers. The next release of OpenIAM will include machine learning during authentication, and subsequent releases will include a risk engine and account take over detection functionality.

Share

Leave a Comment

footer-top-logo
openIAM-white-logo

All modules of our IAM platform share a common infrastructure allowing customers to see one unified identity solution versus a collection of disparate products.

  • linkedin-icon
  • facebook-icon
  • twitter-icon
  • youtube-icon

sales@openiam.com

(858)935-7561

Copyright © 2025 OpenIAM. All rights reserved.
  • Privacy Policy