简体中文
English
Technology
Desktop, Device and Server Management
Security and Networking
Data Protection and Recovery
Private Branch Exchange (PBX) and VoIP Technologies
Premises Distributed System
Identity and Access Management
Security Audit and Consulting
Identity and Access Management
Identity and access management is a cross-functional process that helps organizations to manage who has access to what information over a period of time. Poor or loosely controlled identity and access management processes may lead to organizational regulatory noncompliance and an inability to determine whether company data is being misused.

Sync Solutions Identity and Access Management solution utilizes CA digital certificate, digital envelope, encrypted signature and other asymmetric key encryption technologies to identify authorized users and ensure reliable, complete information transfer.

At the core of authentication system, authentication server intelligently manages remote user access to network and applications, and controls the entire AAA (authentication, authorization and accounting) process. Upon login, user is promoted to insert smart card. Authentication server reads remote user profile via encrypted tunnel and retrieves the matching authorization files.

A typical identity and access management system has the following components:

Authentication service subsystem Provide server API, process user authentication request, recognize user identity and control user access to applications

Authentication management subsystem Manage user profile, query/modify/delete directory, deactivate user account and enable user access control

Authentication database Enable user mapping between smart card and account name

Secure Key (USB smart card) Store digital certificate and private key for encryption/decryption

Copyright © Sync Solutions IT Support Service Corporation All rights reserved.