PROACTEYE ACCESS MANAGEMENT

PROACTEYE ACCESS MANAGEMENT
ProActeye Access Management, built from the lasted next
generation technologies, provides the most comprehensive
and flexible set of services required for consumer facing
access management, as well as traditional access
management capabilities.These services include
authentication, mobile authentication, adaptive risk
assessment, authorization, federation, single sign-on, social
sign-on, basic self service, privacy and consent, and high
performance session management.
ProActeye Access Management is part of the ProActeye IDM &
CASB Suite™, the only commercial CASB offering for access
management, identity management, user-managed access,
directory services and an identity gateway design and built as
single, uniform platform. The solution is built on a highly
salable, modular, extensible, and easy-to-deploy architecture.
Context-aware capabilities enable your employees, customers,
or citizens a personalized experience on any digital channel,
whether a mobile device, connected car, home appliance, or
whatever the next connected innovation might be.
Features and Benefits
Advanced Authentication
Leverage contextual authentication to assess risk, invoking stronger authentication
mechanisms only when necessary by evaluating who the user is and their context.
Mobile Authentication
Enable logins without passwords via Push Authentication feature with iOS and
Android devices.
Provide frictionless multi-factor authentication using Push Authentications.
OATH and HOTP standards that allow one-time password on a mobile phone or
other device to be used as an additional factor for authentication.
Authorization
Create sophisticated, context based and intelligent policies to deliver controlled
access to resources with the GUI-based policy editor, using point and click, drag
and drop operations.
Scripting can also be used to extend logic during policy evaluation to any resource
type, not only URLs but external services or IoT devices and things.
Federation Management:-
Leverage standards to deliver seamless federation across organizations.
Incorporate SAML2 federation into authentication chains, enabling the use of
federated identities in stronger multifactor authentication scenarios.
Support OpenID Connect which makes it easier and faster to build solutions
requiring additional identity information.
Single Sign-On
Provide Single Sign-On(SSO) services for multiple resources on one domain, across
domains, or even across organizations, allowing the use of just a single
authentication credential to access all resources.
Social Authentication
Drives new customer adoption by removing the friction of registration process in
addition to simplifying sign-in.
Performance, Scalability, High Availability, Elasticity:-
Support large-scale, highly available implementations with millions of users, tens of
thousands of concurrent sessions. and thousands of authentications per second.
An ideal choice for securing high volume micro-services environments with
expanded stateless session support.
Leverage the embedded ProActeye Directory Services as a configuration store,
highly scalable and performing session-persistent token and user store.
Standards:-
All major federation protocols: SAML 1.x,SAML 2.0(SP, IdP, ECP and IdP Proxy),
WSFederation (asserting, relaying party)
Next gen-federation standards for cloud and mobile, including full implementation
of OpenID Connect, OAuth 2.0, GSMA, and UMA(consumer, provider, authorization
server),ensuring greater interoperability and consistent behaviour for developers.
Export and import of policies via XACML.
Secure mobile access for BYOD users
Deliver applications and information to mobile devices securely so your BYOD users
can access them anytime.
Administrators can control which applications different users can access with a
single touch of the icon
Includes an SDK (iOS and Android)to enables mobile app developers to leverage
ProActeye for credential management.
It also enforces access controls to the applications and services that support the
mobile apps.
THANK YOU
13
1 von 7

Recomendados

OWASPSanAntonio_2006_08_SingleSignOn.ppt von
OWASPSanAntonio_2006_08_SingleSignOn.pptOWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.pptwebhostingguy
537 views27 Folien
eMAS Indentity and Access Management von
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access ManagementKalyana Sundaram
29 views4 Folien
Quest One Identity Management Summary von
Quest One Identity Management   SummaryQuest One Identity Management   Summary
Quest One Identity Management SummaryQuest Software
1.2K views4 Folien
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id... von
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...Profesia Srl, Lynx Group
95 views54 Folien
IntraLinks Company Overview von
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overviewtillbrennan
238 views2 Folien
User Management, Enablement, Directory von
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, DirectoryUbisecure
172 views2 Folien

Más contenido relacionado

Was ist angesagt?

OneIdentity - A Future-Ready Approach to IAM von
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMAdrian Dumitrescu
984 views36 Folien
Veriphyr bright talk 20120523 von
Veriphyr bright talk 20120523Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Accenture
301 views15 Folien
Arx brochure - Intellect Design von
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect DesignRajat Jain
53 views8 Folien
LTS Secure Identity Management von
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Managementrver21
42 views8 Folien
Single sign on - benefits, challenges and case study : iFour consultancy von
Single sign on - benefits, challenges and case study :  iFour consultancySingle sign on - benefits, challenges and case study :  iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancyDevam Shah
2K views22 Folien
SailPoint - IdentityNow Identity Governance von
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceArijan Horvat
807 views4 Folien

Was ist angesagt?(20)

OneIdentity - A Future-Ready Approach to IAM von Adrian Dumitrescu
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAM
Adrian Dumitrescu984 views
Veriphyr bright talk 20120523 von Accenture
Veriphyr bright talk 20120523Veriphyr bright talk 20120523
Veriphyr bright talk 20120523
Accenture301 views
Arx brochure - Intellect Design von Rajat Jain
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
Rajat Jain53 views
LTS Secure Identity Management von rver21
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
rver2142 views
Single sign on - benefits, challenges and case study : iFour consultancy von Devam Shah
Single sign on - benefits, challenges and case study :  iFour consultancySingle sign on - benefits, challenges and case study :  iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancy
Devam Shah2K views
SailPoint - IdentityNow Identity Governance von Arijan Horvat
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity Governance
Arijan Horvat807 views
LTS Secure Identity Management von rver21
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
rver2133 views
Single Sign On - Case Study von Ebizon
Single Sign On - Case StudySingle Sign On - Case Study
Single Sign On - Case Study
Ebizon2.9K views
Premier Webcast - Identity Management with Windows Azure AD von uberbaum
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
uberbaum1K views
Identiverse 2021 enterprise identity: What foundations von Bertrand Carlier
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundations
Bertrand Carlier94 views
Web Single sign on system von Swati Sinha
Web Single sign on systemWeb Single sign on system
Web Single sign on system
Swati Sinha462 views
Identity Management von rver21
Identity ManagementIdentity Management
Identity Management
rver2133 views
Securely access and audit the cloud von Novell
Securely access and audit the cloudSecurely access and audit the cloud
Securely access and audit the cloud
Novell486 views
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro... von SafeNet
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeNet536 views

Similar a PROACTEYE ACCESS MANAGEMENT

Access management von
Access managementAccess management
Access managementkmehul
24 views7 Folien
Microsoft Forefront - Identity and Access Management Whitepaper von
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Private Cloud
396 views2 Folien
Enterprise Remote Support Datasheet - Lyra Infosystems von
Enterprise Remote Support Datasheet - Lyra InfosystemsEnterprise Remote Support Datasheet - Lyra Infosystems
Enterprise Remote Support Datasheet - Lyra InfosystemsLyra Infosystems Pvt. Ltd
7 views2 Folien
Identity and Access Management von
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementInstaSafe Technologies
12 views8 Folien
SECURE ACCESS GATEWAYS von
SECURE ACCESS GATEWAYSSECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYS Array Networks
251 views15 Folien
Single SignOn and Context Management Solutions von
Single SignOn and Context Management SolutionsSingle SignOn and Context Management Solutions
Single SignOn and Context Management Solutionsmanikrane
329 views11 Folien

Similar a PROACTEYE ACCESS MANAGEMENT(20)

Access management von kmehul
Access managementAccess management
Access management
kmehul24 views
Single SignOn and Context Management Solutions von manikrane
Single SignOn and Context Management SolutionsSingle SignOn and Context Management Solutions
Single SignOn and Context Management Solutions
manikrane329 views
The only authentication platform you’ll ever need. von Icomm Technologies
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
Icomm Technologies298 views
Array Networks - Secure Access Gateways von Array Networks
Array Networks - Secure Access GatewaysArray Networks - Secure Access Gateways
Array Networks - Secure Access Gateways
Array Networks559 views
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat... von Entrust Datacard
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
Entrust Datacard553 views
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined... von Block Armour
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Block Armour25 views
Block Armour Blockchain Defined Perimeter Brochure von Block Armour
Block Armour Blockchain Defined Perimeter BrochureBlock Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter Brochure
Block Armour6 views
Symplified datasheet von Symplified
Symplified datasheetSymplified datasheet
Symplified datasheet
Symplified336 views
DEVNET-1132 Create B2B Exchanges with Cisco Connected Processes von Cisco DevNet
DEVNET-1132	Create B2B Exchanges with Cisco Connected ProcessesDEVNET-1132	Create B2B Exchanges with Cisco Connected Processes
DEVNET-1132 Create B2B Exchanges with Cisco Connected Processes
Cisco DevNet1.2K views

Más de hardik soni

Next generation siem von
Next generation siemNext generation siem
Next generation siemhardik soni
121 views4 Folien
Leo TechnoSoft’s Intelligence Driven SOC is integrated Context-aware Security... von
Leo TechnoSoft’s Intelligence Driven SOC is integrated Context-aware Security...Leo TechnoSoft’s Intelligence Driven SOC is integrated Context-aware Security...
Leo TechnoSoft’s Intelligence Driven SOC is integrated Context-aware Security...hardik soni
99 views8 Folien
Identity management von
Identity managementIdentity management
Identity managementhardik soni
99 views8 Folien
privileged identity management pim von
privileged identity management pimprivileged identity management pim
privileged identity management pimhardik soni
77 views5 Folien
Leo technosoft product description von
Leo technosoft product descriptionLeo technosoft product description
Leo technosoft product descriptionhardik soni
54 views14 Folien
Cloud access unified siem von
Cloud access unified siemCloud access unified siem
Cloud access unified siemhardik soni
104 views32 Folien

Más de hardik soni(13)

Next generation siem von hardik soni
Next generation siemNext generation siem
Next generation siem
hardik soni121 views
Leo TechnoSoft’s Intelligence Driven SOC is integrated Context-aware Security... von hardik soni
Leo TechnoSoft’s Intelligence Driven SOC is integrated Context-aware Security...Leo TechnoSoft’s Intelligence Driven SOC is integrated Context-aware Security...
Leo TechnoSoft’s Intelligence Driven SOC is integrated Context-aware Security...
hardik soni99 views
privileged identity management pim von hardik soni
privileged identity management pimprivileged identity management pim
privileged identity management pim
hardik soni77 views
Leo technosoft product description von hardik soni
Leo technosoft product descriptionLeo technosoft product description
Leo technosoft product description
hardik soni54 views
Cloud access unified siem von hardik soni
Cloud access unified siemCloud access unified siem
Cloud access unified siem
hardik soni104 views
Security Information and Event Management (SIEM) von hardik soni
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
hardik soni2K views
PROACTEYE IDENTITY MANAGEMENT von hardik soni
PROACTEYE IDENTITY MANAGEMENTPROACTEYE IDENTITY MANAGEMENT
PROACTEYE IDENTITY MANAGEMENT
hardik soni52 views
Need of Adaptive Authentication in defending the borderless Enterprise von hardik soni
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprise
hardik soni45 views
Siem tools-monitor-your-network von hardik soni
Siem tools-monitor-your-networkSiem tools-monitor-your-network
Siem tools-monitor-your-network
hardik soni174 views
Soc security-analyticsof leotechnosoft von hardik soni
Soc security-analyticsof leotechnosoftSoc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosoft
hardik soni35 views

Último

2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx von
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptxanimuscrm
11 views19 Folien
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - Prida von
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - PridaDSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - Prida
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - PridaDeltares
17 views9 Folien
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea... von
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...Safe Software
391 views59 Folien
El Arte de lo Possible von
El Arte de lo PossibleEl Arte de lo Possible
El Arte de lo PossibleNeo4j
34 views35 Folien
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -... von
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...Deltares
6 views15 Folien
DSD-INT 2023 Baseline studies for Strategic Coastal protection for Long Islan... von
DSD-INT 2023 Baseline studies for Strategic Coastal protection for Long Islan...DSD-INT 2023 Baseline studies for Strategic Coastal protection for Long Islan...
DSD-INT 2023 Baseline studies for Strategic Coastal protection for Long Islan...Deltares
10 views30 Folien

Último(20)

2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx von animuscrm
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx
animuscrm11 views
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - Prida von Deltares
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - PridaDSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - Prida
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - Prida
Deltares17 views
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea... von Safe Software
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...
Safe Software391 views
El Arte de lo Possible von Neo4j
El Arte de lo PossibleEl Arte de lo Possible
El Arte de lo Possible
Neo4j34 views
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -... von Deltares
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...
Deltares6 views
DSD-INT 2023 Baseline studies for Strategic Coastal protection for Long Islan... von Deltares
DSD-INT 2023 Baseline studies for Strategic Coastal protection for Long Islan...DSD-INT 2023 Baseline studies for Strategic Coastal protection for Long Islan...
DSD-INT 2023 Baseline studies for Strategic Coastal protection for Long Islan...
Deltares10 views
Upgrading Incident Management with Icinga - Icinga Camp Milan 2023 von Icinga
Upgrading Incident Management with Icinga - Icinga Camp Milan 2023Upgrading Incident Management with Icinga - Icinga Camp Milan 2023
Upgrading Incident Management with Icinga - Icinga Camp Milan 2023
Icinga36 views
Roadmap y Novedades de producto von Neo4j
Roadmap y Novedades de productoRoadmap y Novedades de producto
Roadmap y Novedades de producto
Neo4j43 views
DSD-INT 2023 3D hydrodynamic modelling of microplastic transport in lakes - J... von Deltares
DSD-INT 2023 3D hydrodynamic modelling of microplastic transport in lakes - J...DSD-INT 2023 3D hydrodynamic modelling of microplastic transport in lakes - J...
DSD-INT 2023 3D hydrodynamic modelling of microplastic transport in lakes - J...
Deltares7 views
Copilot Prompting Toolkit_All Resources.pdf von Riccardo Zamana
Copilot Prompting Toolkit_All Resources.pdfCopilot Prompting Toolkit_All Resources.pdf
Copilot Prompting Toolkit_All Resources.pdf
Riccardo Zamana6 views
Elevate your SAP landscape's efficiency and performance with HCL Workload Aut... von HCLSoftware
Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...
Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...
HCLSoftware6 views
Consulting for Data Monetization Maximizing the Profit Potential of Your Data... von Flexsin
Consulting for Data Monetization Maximizing the Profit Potential of Your Data...Consulting for Data Monetization Maximizing the Profit Potential of Your Data...
Consulting for Data Monetization Maximizing the Profit Potential of Your Data...
Flexsin 15 views
Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ... von marksimpsongw
Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ...Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ...
Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ...
marksimpsongw74 views
SUGCON ANZ Presentation V2.1 Final.pptx von Jack Spektor
SUGCON ANZ Presentation V2.1 Final.pptxSUGCON ANZ Presentation V2.1 Final.pptx
SUGCON ANZ Presentation V2.1 Final.pptx
Jack Spektor21 views
DSD-INT 2023 Modelling litter in the Yarra and Maribyrnong Rivers (Australia)... von Deltares
DSD-INT 2023 Modelling litter in the Yarra and Maribyrnong Rivers (Australia)...DSD-INT 2023 Modelling litter in the Yarra and Maribyrnong Rivers (Australia)...
DSD-INT 2023 Modelling litter in the Yarra and Maribyrnong Rivers (Australia)...
Deltares9 views
DSD-INT 2023 HydroMT model building and river-coast coupling in Python - Bove... von Deltares
DSD-INT 2023 HydroMT model building and river-coast coupling in Python - Bove...DSD-INT 2023 HydroMT model building and river-coast coupling in Python - Bove...
DSD-INT 2023 HydroMT model building and river-coast coupling in Python - Bove...
Deltares15 views
Citi TechTalk Session 2: Kafka Deep Dive von confluent
Citi TechTalk Session 2: Kafka Deep DiveCiti TechTalk Session 2: Kafka Deep Dive
Citi TechTalk Session 2: Kafka Deep Dive
confluent17 views
Software testing company in India.pptx von SakshiPatel82
Software testing company in India.pptxSoftware testing company in India.pptx
Software testing company in India.pptx
SakshiPatel827 views

PROACTEYE ACCESS MANAGEMENT

  • 1. PROACTEYE ACCESS MANAGEMENT ProActeye Access Management, built from the lasted next generation technologies, provides the most comprehensive and flexible set of services required for consumer facing access management, as well as traditional access management capabilities.These services include authentication, mobile authentication, adaptive risk assessment, authorization, federation, single sign-on, social sign-on, basic self service, privacy and consent, and high performance session management.
  • 2. ProActeye Access Management is part of the ProActeye IDM & CASB Suite™, the only commercial CASB offering for access management, identity management, user-managed access, directory services and an identity gateway design and built as single, uniform platform. The solution is built on a highly salable, modular, extensible, and easy-to-deploy architecture. Context-aware capabilities enable your employees, customers, or citizens a personalized experience on any digital channel, whether a mobile device, connected car, home appliance, or whatever the next connected innovation might be.
  • 3. Features and Benefits Advanced Authentication Leverage contextual authentication to assess risk, invoking stronger authentication mechanisms only when necessary by evaluating who the user is and their context. Mobile Authentication Enable logins without passwords via Push Authentication feature with iOS and Android devices. Provide frictionless multi-factor authentication using Push Authentications. OATH and HOTP standards that allow one-time password on a mobile phone or other device to be used as an additional factor for authentication.
  • 4. Authorization Create sophisticated, context based and intelligent policies to deliver controlled access to resources with the GUI-based policy editor, using point and click, drag and drop operations. Scripting can also be used to extend logic during policy evaluation to any resource type, not only URLs but external services or IoT devices and things. Federation Management:- Leverage standards to deliver seamless federation across organizations. Incorporate SAML2 federation into authentication chains, enabling the use of federated identities in stronger multifactor authentication scenarios. Support OpenID Connect which makes it easier and faster to build solutions requiring additional identity information. Single Sign-On Provide Single Sign-On(SSO) services for multiple resources on one domain, across domains, or even across organizations, allowing the use of just a single authentication credential to access all resources.
  • 5. Social Authentication Drives new customer adoption by removing the friction of registration process in addition to simplifying sign-in. Performance, Scalability, High Availability, Elasticity:- Support large-scale, highly available implementations with millions of users, tens of thousands of concurrent sessions. and thousands of authentications per second. An ideal choice for securing high volume micro-services environments with expanded stateless session support. Leverage the embedded ProActeye Directory Services as a configuration store, highly scalable and performing session-persistent token and user store. Standards:- All major federation protocols: SAML 1.x,SAML 2.0(SP, IdP, ECP and IdP Proxy), WSFederation (asserting, relaying party) Next gen-federation standards for cloud and mobile, including full implementation of OpenID Connect, OAuth 2.0, GSMA, and UMA(consumer, provider, authorization server),ensuring greater interoperability and consistent behaviour for developers. Export and import of policies via XACML.
  • 6. Secure mobile access for BYOD users Deliver applications and information to mobile devices securely so your BYOD users can access them anytime. Administrators can control which applications different users can access with a single touch of the icon Includes an SDK (iOS and Android)to enables mobile app developers to leverage ProActeye for credential management. It also enforces access controls to the applications and services that support the mobile apps.