With modern businesses running many electronic systems simultaneously, monitoring who, how and from where these are accessed can feel like a never-ending task. Our Identity and Access Management solution can take control of all your systems and users, so everyone has the access they need.
Key to this is providing access without leaving holes for unauthorised personnel, be they hackers or simply people who have left your organisation.
Running as part of our Aurora system, this solution uses a host of modern technology including ADFS, Azure AD and Active Directory Health Check. It uses a principle of Role Based Access Control (RBAC) and can be configured to your company’s precise requirements.
Key Features and Benefits
Custom Branding and Scripting
Aurora can be custom-branded to fit your organisation. Processes for identifying and authenticating users and providing system access, are also highly configurable. We consider the full life-cycle of the user, including withdrawal of access when personnel leave.
Provisioning and Integration
Aurora can be configured to automatically provision new users for the system, either via integration with Microsoft Active Directory or by linking into external systems.
Once in the system, users can perform their own ‘self-service’ password resets, and administrators can use portals to grant access to additional systems and groups.
An extensive range of reports is available from the point of installation, allowing you to easily monitor and verify how systems are being accessed and used.
A Choice of Authentication Methods
Secure authentication to IT systems often involves more than just passwords. As well as offering secure web-based access from any browser on any device, the system supports secure two-factor authentication using both hard and soft tokens.