Topic Features Benefits
Password Management
  • Password synchronization across managed systems
  • Strengthened password security
  • Central policy administration to control composition, password generation, etc.
  • Password aging and reset
  • Allows users to maintain a single password across all systems, which reduces the need to remember multiple passwords.
  • Improves end user productivity by reducing the number of passwords to remember
 Self Service
  • Self Service enables end users to manage their profiles and passwords
  • White pages functionality
  • “Forgot password” functionality”
  • Improves end user productivity
  • Reduces help desk volume
  • Identity life cycle management
  • Automatic provisioning
  • GUI based workflow modeling
  • Request / Approval functionality
  • SPML 2 compliant connectors
  • Automatic provisioning, re-provisioning, and de-provisioning of users and resources
  • Improves security by ensuring access is granted and removed as needed
  • Improved end user productivity
  • Reduces operational cost.
 Role Management
  • Role lifecycle management
  • Requests, approval process to define new roles and update existing roles
  • GUI based workflow process definitions for approval processes
  • Role lifecycle reporting
  • Periodic review and adaptation of role model to business needs
  • Request, review, approval, and assignment of users to roles
  • Integration of job Roles with identity lifecycle improves alignment between business and IT
  • Improves compliance and enforcement of IT controls.
  • Reduces cost of audits
  • Auditor Policy to confirm that IT Roles are provisioned correctly
Entitlement Management
  • Automatic provisioning fine grained entitlements across managed systems
  • Leverages provisioning and role management components
  • Improves compliance by providing necessary access to data in audits
  • Ensure the access is granted to only appropriate users.
Audit and Compliance
  • Fine grained audit control across architecture
  • Provides comprehensive framework for establishing access control compliance
  • Reduced costs for provisioning and identity auditing
  • Automated reviews and proactive scanning, consistent enforcement and repeatable processes
  • Enables synchronization between a source system and the target systems that are managed by the identity manager
  •  Detects changes in the target system and synchronizes them with the other target systems. Also detects orphans.
Delegated Administration
  •  Allows the administrator to delegate certain rights to other users based on a set of rules.
Recent Posts
The latest release by OpenIAM adds support for Red Hat Enterprise Linux 8 and continues to extend its scalable microservices based solution OpenIAM LLC, has announced the release of Identity and Access Management Platform version 4.1.6 today. This release adds...
RSA Conference 2019
We will be exhibiting at the RSA Conference in San Francisco in March, and welcome the opportunity to meet you in person for questions and on-site demos. For a complimentary Expo Plus Pass, please use the registration code XEU9OPENIAM at the RSA...
OpenIAM v4.1 provides organizations with a feature complete IAM platform which leverages modern technologies such as Docker, Kubernetes, Elasticsearch and Redis to provide a user-friendly, small footprint solution which is currently in production at mid to large enterprises globally. Cortlandt...
CORTLANDT MANOR, NY JUNE 21, 2016: OpenIAM, a top Open Source Identity and Access Management vendor, has bolstered security at organizations while increasing employee productivity through its automated Self-Service Portal. In lieu of calls to the help desk due to...
read more
Sign in
Lost your password?

Products of Interest

How did you hear about us?

Registration confirmation will be emailed to you.