SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Lotus Notes
 Integration                          Simplifying Lotus Notes Management
Lotus Notes ID files and passwords      The Challenge
use a complicated combination of        Managing Lotus Notes ID files and passwords is a challenge for most organizations. ID
encryption and data replication.        files are physically distributed, with some users having multiple copies on their PC hard
This complexity makes Lotus Notes
                                        drive, network share or even a USB flash drive. Passwords are applied to both ID files
expensive to manage and support.
                                        and server-based, distributed database on mail servers. To make matters worse, ID files
                                        are encrypted with the user’s current password, making administrative password resets
The Hitachi ID Management Suite
simplifies user setup, password         impossible.
synchronization, password resets,
                                        Onboarding
managing security entitlements in
                                        Activating new users on Lotus Notes is harder than on other platforms. Users need to
the Notes environment and user
deactivation.                           get a mail box, an entry in the name and address book (NAB), a new ID file and software
                                        must be installed on their PC. This is much more complex than creating a new account
Hitachi ID automation and self-         on a typical directory or application.
service reduce the cost of managing
and supporting Lotus Notes.             Password expiration and synchronization
                                        Routine password changes on Lotus Notes must be coordinated between the user’s ID
                                        file(s), the user’s entry in the Notes directory and other systems, such as Active Direc-
                                        tory. This is too hard for users to manage.

                                        Forgotten passwords and intruder lockouts
                                        If users forget their Notes password, they require extraordinary assistance from the help
                                        desk. Since a simple, administrative password reset is not possible on Lotus Notes, the
                                        help desk must use one of several complex and expensive processes:
                                            •	 Key recovery
                                            •	 Deleting the user’s account and creating a new one
                                            •	 Recovering the user’s old (and possibly outdated) ID file from a database
                                        In any case, the new or recovered ID file must somehow be installed on the user’s PC.

                                        Moving and deactivating users
                                        Moving users from one location or department to another may require their ID file to be
                                        moved as well as their mail folder. This is more complex than simply moving a user’s
                                        object to a new OU in a directory, for example. Deactivating Notes users requires that
                                        their public key be added to a certificate revocation list -- a complexity that arises be-
                                        cause of the public key infrastructure (PKI) built into Lotus Notes.



                                        The Solution
                                        The Hitachi ID Management Suite includes both extensive user lifecycle management
                                        automation and advanced integration with Lotus Notes. This combination helps organi-
                                        zations to reduce the total cost of ownership of the Lotus Notes platform:

                                        User Lifecycle Management Automation
                                        An unattended process can monitor one or more systems of record and automatically
                                        create or delete user accounts on Lotus Notes and other systems.

                                        A self-service request entry and approvals system allows business users to request
                                        updates to their profiles (e.g., new phone number) and entitlements (e.g., add user to
                                        security group). These requests are validated, routed, approved and executed without IT
                                        involvement.
hitachi-id.com

The Hitachi ID Management Suite                                                                                                            Technical Specifications
                                                                                                                                           TARGET SYSTEM Integration
Password synchronization and self-service password reset
                                                                                                                                           Directory:
Hitachi ID Password Manager can intercept “native” password changes on systems including                                                   Windows domains, Active Directory, eDirectory,
Lotus Notes and Active Directory and automatically set all of that user’s other passwords to                                               Novell NDS, any LDAP
the same new value. It also provides a user interface where users who forgot their password                                                File/Print:
or triggered a lockout can authenticate with something other than their password (for example,                                             Windows 2000, 2003, 2008; Novell NetWare,
answering personal questions) and can then choose a new password. This is accessible from                                                  Samba
a web browser, the login prompt, a smart phone or a telephone.                                                                             Databases:
                                                                                                                                           Oracle, Sybase, SQL Server, DB2/UDB, Informix
Simplified application login
                                                                                                                                           Unix:
Hitachi ID Login Manager can capture a user’s Windows login ID and password when the user                                                  Linux, Solaris, HPUX, AIX, Tru64, Irix, Unisys, SCO,
signs into his workstation and can automatically insert those credentials into other applica-                                              DG; passwd, shadow, TCB, Kerberos, NIS, NIS+
tions that the user launches, such as Lotus Notes. This complements password synchroniza-                                                  Mainframes:
tion with single signon.                                                                                                                   z/OS, VM/ESA, Unisys, Siemens

                                                                                                                                           Minis:
Integration with Lotus Notes ID files and User Directories                                                                                 iSeries OS400, OpenVMS, Tandem
The Hitachi ID Identity Management Suite includes advanced technology for creating, distrib-                                               Applications:
uting and managing ID files, as well as user entries in the Lotus Notes directory (Name and                                                Oracle eBusiness Suite, PeopleSoft, SAP R/3, JD
Address Book / NAB). This includes collecting ID files and passwords from user PCs and                                                     Edwards
storing them in a secure database as well as pushing out updated ID files back to user PCs                                                 Groupware:
or network shares. In fact, the Hitachi ID architecture for managing ID files works so well that                                           Microsoft Exchange, Lotus Notes, Novell Group-
IBM copied it in the Lotus Notes 8.5 release.                                                                                              Wise

                                                                                                                                           Networking:
Impact                                                                                                                                     Cisco ACS, RADIUS, TACACS+, etc.

Deploying Hitachi ID Password Manager reduces the cost and complexity of managing users                                                    Flexible Agents:
and passwords in the Lotus Notes environment:                                                                                              API, Web services, command-line, SSH, Telnet,
                                                                                                                                           TN3270, TN5250, SQL injection, LDAP attributes,
     •	 User setup is simpler and faster.
                                                                                                                                           Web services, web forms
     •	 Passwords are automatically synchronized between Lotus Notes and Active Directory
     •	 Users can reset their own forgotten passwords.
                                                                                                                                           Support Integration
     •	 Security entitlements can be managed and reviewed by business users                                                                Automatically create/update/close incidents:
     •	 Access deactivation is automatic and reliable.
                                                                                                                                           • Axios Assyst
                                                                                                                                           • BMC Remedy AR System
                                                                                                                                           • BMC Service Desk Express	
                                                                                                                                           • CA Unicenter Service Desk
                                                                                                                                           • Clarify eFrontOffice
                                                                                                                                           • FrontRange HEAT 	
                                                                                                                                           • HP Service Manager
                                                                                                                                           • Tivoli Service Desk

                                                                                                                                           Additional integrations through e-mail, ODBC,
                                                                                                                                           web services, web forms, SQL injection, LDAP
                                                                                                                                           attributes and command-line.




                                                                                                                                         500, 1401 - 1 Street SE
© 2012 Hitachi ID Systems, Inc. All rights reserved. P-Synch and ID-Synch are registered trademarks of Hitachi ID Systems, Inc. in the   Calgary AB Canada T2G 2J3
United States and Canada. All other marks, symbols and trademarks are the property of their respective owners.                           Tel: 1.403.233.0740 Fax: 1.403.233.0725
                                                                                                                                         E-Mail: info@Hitachi-ID.com

Weitere ähnliche Inhalte

Mehr von Hitachi ID Systems, Inc.

Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?Hitachi ID Systems, Inc.
 

Mehr von Hitachi ID Systems, Inc. (20)

Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Maximizing Value
Maximizing ValueMaximizing Value
Maximizing Value
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 

Kürzlich hochgeladen

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Kürzlich hochgeladen (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Simplifying Lotus Notes Management

  • 1. Lotus Notes Integration Simplifying Lotus Notes Management Lotus Notes ID files and passwords The Challenge use a complicated combination of Managing Lotus Notes ID files and passwords is a challenge for most organizations. ID encryption and data replication. files are physically distributed, with some users having multiple copies on their PC hard This complexity makes Lotus Notes drive, network share or even a USB flash drive. Passwords are applied to both ID files expensive to manage and support. and server-based, distributed database on mail servers. To make matters worse, ID files are encrypted with the user’s current password, making administrative password resets The Hitachi ID Management Suite simplifies user setup, password impossible. synchronization, password resets, Onboarding managing security entitlements in Activating new users on Lotus Notes is harder than on other platforms. Users need to the Notes environment and user deactivation. get a mail box, an entry in the name and address book (NAB), a new ID file and software must be installed on their PC. This is much more complex than creating a new account Hitachi ID automation and self- on a typical directory or application. service reduce the cost of managing and supporting Lotus Notes. Password expiration and synchronization Routine password changes on Lotus Notes must be coordinated between the user’s ID file(s), the user’s entry in the Notes directory and other systems, such as Active Direc- tory. This is too hard for users to manage. Forgotten passwords and intruder lockouts If users forget their Notes password, they require extraordinary assistance from the help desk. Since a simple, administrative password reset is not possible on Lotus Notes, the help desk must use one of several complex and expensive processes: • Key recovery • Deleting the user’s account and creating a new one • Recovering the user’s old (and possibly outdated) ID file from a database In any case, the new or recovered ID file must somehow be installed on the user’s PC. Moving and deactivating users Moving users from one location or department to another may require their ID file to be moved as well as their mail folder. This is more complex than simply moving a user’s object to a new OU in a directory, for example. Deactivating Notes users requires that their public key be added to a certificate revocation list -- a complexity that arises be- cause of the public key infrastructure (PKI) built into Lotus Notes. The Solution The Hitachi ID Management Suite includes both extensive user lifecycle management automation and advanced integration with Lotus Notes. This combination helps organi- zations to reduce the total cost of ownership of the Lotus Notes platform: User Lifecycle Management Automation An unattended process can monitor one or more systems of record and automatically create or delete user accounts on Lotus Notes and other systems. A self-service request entry and approvals system allows business users to request updates to their profiles (e.g., new phone number) and entitlements (e.g., add user to security group). These requests are validated, routed, approved and executed without IT involvement.
  • 2. hitachi-id.com The Hitachi ID Management Suite Technical Specifications TARGET SYSTEM Integration Password synchronization and self-service password reset Directory: Hitachi ID Password Manager can intercept “native” password changes on systems including Windows domains, Active Directory, eDirectory, Lotus Notes and Active Directory and automatically set all of that user’s other passwords to Novell NDS, any LDAP the same new value. It also provides a user interface where users who forgot their password File/Print: or triggered a lockout can authenticate with something other than their password (for example, Windows 2000, 2003, 2008; Novell NetWare, answering personal questions) and can then choose a new password. This is accessible from Samba a web browser, the login prompt, a smart phone or a telephone. Databases: Oracle, Sybase, SQL Server, DB2/UDB, Informix Simplified application login Unix: Hitachi ID Login Manager can capture a user’s Windows login ID and password when the user Linux, Solaris, HPUX, AIX, Tru64, Irix, Unisys, SCO, signs into his workstation and can automatically insert those credentials into other applica- DG; passwd, shadow, TCB, Kerberos, NIS, NIS+ tions that the user launches, such as Lotus Notes. This complements password synchroniza- Mainframes: tion with single signon. z/OS, VM/ESA, Unisys, Siemens Minis: Integration with Lotus Notes ID files and User Directories iSeries OS400, OpenVMS, Tandem The Hitachi ID Identity Management Suite includes advanced technology for creating, distrib- Applications: uting and managing ID files, as well as user entries in the Lotus Notes directory (Name and Oracle eBusiness Suite, PeopleSoft, SAP R/3, JD Address Book / NAB). This includes collecting ID files and passwords from user PCs and Edwards storing them in a secure database as well as pushing out updated ID files back to user PCs Groupware: or network shares. In fact, the Hitachi ID architecture for managing ID files works so well that Microsoft Exchange, Lotus Notes, Novell Group- IBM copied it in the Lotus Notes 8.5 release. Wise Networking: Impact Cisco ACS, RADIUS, TACACS+, etc. Deploying Hitachi ID Password Manager reduces the cost and complexity of managing users Flexible Agents: and passwords in the Lotus Notes environment: API, Web services, command-line, SSH, Telnet, TN3270, TN5250, SQL injection, LDAP attributes, • User setup is simpler and faster. Web services, web forms • Passwords are automatically synchronized between Lotus Notes and Active Directory • Users can reset their own forgotten passwords. Support Integration • Security entitlements can be managed and reviewed by business users Automatically create/update/close incidents: • Access deactivation is automatic and reliable. • Axios Assyst • BMC Remedy AR System • BMC Service Desk Express • CA Unicenter Service Desk • Clarify eFrontOffice • FrontRange HEAT • HP Service Manager • Tivoli Service Desk Additional integrations through e-mail, ODBC, web services, web forms, SQL injection, LDAP attributes and command-line. 500, 1401 - 1 Street SE © 2012 Hitachi ID Systems, Inc. All rights reserved. P-Synch and ID-Synch are registered trademarks of Hitachi ID Systems, Inc. in the Calgary AB Canada T2G 2J3 United States and Canada. All other marks, symbols and trademarks are the property of their respective owners. Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: info@Hitachi-ID.com