Identity and Access Management

So long as your users stay behind the firewall, you can design security policies that protect access to your business applications. What happens when access is required to cloud based applications. In this case cloud SSO providers require you to create yet another directory or virtual identity source. Even more a problem, what do you do when you need to give clients and/or partners access to your applications, whether they be without or outside of your firewall! Another bigger identity store with users from outside the organisation!

Technical Icon

Your Solution Architects design with total assurance that no other directories need be created or maintained.
Your DevOps teams build and deploy quickly with your own identity store across your own servers inside your own firewall. We can also SAML2-enable any non-SAML legacy applications.

The Mvine Cloud Based Platform – Secure, Compliant and Reliable.

Mvine Federated Authentication Hub: Technical Capabilities

Federation Protocols

SAML 2.0

Federation Roles

Identity Provider (IdP)

Service Provider (SP)

Security Token Service (STS)

Identity Bridge

Federation IdP Proxy

Federating SP Proxy

Deployment Options

On-Premises

Cloud

Hybrid (Integrated Cloud and On-premises)

Key Capabilities

IdP-Initiated SSO

SP-Initiated SSO

Single Log-Out (SLO)

Attribute relay and filtering

Adaptive Authentication

Multi-factor Authentication

Attribute Aggregation:

  • LDAP
  • DSI
  • Custom (via SDK)

SAML Metadata

Certificate Management

Automated Provisioning

JIT Provisioning

Administration APIs

Session Revocation

NO NEED FOR PASSWORD MANAGEMENT

Certificate Validation

CRL

OCSP

Logging, Monitoring and HA

File-based

Common Event Format (CEF)

Database

SAML Bindings

HTTP Post

HTTP Artifact

HTTP Redirect

SOAP

Authentication

LDAP

Database (DBI)

User defined

Supported Platforms

Redhat Linux ES 5.10

Redhat Linux ES 6.5

Suse Linux Enterprise 11 SP3

Oracle Enterprise Linux 6.5

Ubunto 14.04 LTS

Debian Stable

Supported Browsers:

Chrome

Firefox

Internet Explorer (Version 9 and higher)

Safari

Android 4.0 (Chrome)

iOS 7 (Safari)

Hardware Security Modules (HSM)

User defined

Extendable Capabilites (SDK)

IdP and SP Adapters

Password Credential Validators

Token Generators

Data Sources

Adapter Selectors

Provisioners

Filling in our contact form gets you our full attention. Contact us today

Please type the two words:
Play New Video
Play New Video

Frank Joshi

Watch Frank talk about cyber security and four more topics