Secure Single Sign-On from idenprotect

Next Generation Secure Single Sign-On – Scale Security and Usability Across Your Organization

How Compromised is Your Single Sign-On Solution?

Getting secure SSO right in your organisation starts with the removal of passwords and pre-shared secrets. idenprotect are leaders in simple to use password-free technology, designed to replace passwords and eliminate the risks of password theft, password reuse and phishing. It significantly improves the security of SSO systems therefore protecting your systems and data.

idenprotect’s Secure Single Sign-On – Main Features

Deploy-Icon-White

On-premise, Hybrid or Cloud Single Sign-on

A fast, secure and robust single sign-on solution that can be installed on-premise, in the cloud or as a hybrid deployment. It can be configured to work with your internal and external applications with ease.

Computer-Icon-White

Multi-Portal and Reverse-Proxy Architecture

Protect your applications by integrating and customizing Single Sign-on functionality for both internal and external users. The architecture provides the essential flexibility needed to fit with your own internal architecture designs.

Book-Icon-White

Secure Standards-Based User Directory Integration

Includes an internal directory with the ability to connect to multiple LDAP and Active Directory domains and forests. It provides features that allow identity data attributes to be written back to external directories, all delivered over secure links.

Exlamation-Icon-White

Alerting, Reporting and Logging

Realtime ability to log, report and alert that can also integrate with SEIM technology.

Mobile-Icon-White

Multi-factor Authentication

Supporting a number of different authentication types from idenprotect’s Password-Free MFA, OTP, hard tokens, digital certificates and more – ensuring proper security controls are applied and maintained.

Application-Icon-White

Ability to Customize

The platform can be customised with your branding and logos ensuring consistency with your internal services.

Flexible and Feature-Rich – Configure idenprotect for Your Needs

A Flexible Architecture to Support Your Needs

Different applications may have different requirements to allow a user to authenticate. To ensure a consistent and fluid SSO experience for your users across the enterprise, idenprotect can cater for different application access requirements by using multiple authentication methods behind the scenes whilst interacting with users in a regular way.

Make it fit with your Organisation’s brand

idenprotect allows for customisations to its UI to ensure a fit within your organisation’s branding scheme. It provides the visual trust required by your staff and external authorised users that they are using a system owned by your organisation.

Securely connect and manage your LDAP or Active Directory Services

  • Mutually authenticated TLS to ensure both the LDAP or Active Directory server and the idenprotect platform are trusted
  • Ability to securely update, reset and unlock user accounts, adhering to existing password complexity rules
  • Ability to write signed and trusted certificates back to LDAP or Active Directory
  • Ability to search for LDAP and Active Directory scheme attributes and custom attributes
  • Connect to multiple domains and multiple forests within AD without installing agents on Domain Controllers

What idenprotect can do for you

Prevent credential compromise by eliminating passwords

Over 80% of data breaches are a result of
compromised passwords. idenprotect’s advanced public-key cryptography and decentralized security model replaces password-based authentication, therefore reducing risk.

Provide a simple and seamless user experience for all users

Free up your user’s time to work on more important things once they no longer have to face the frustrations and complexities of logging into multiple applications with multiple passwords on
a daily basis.

Securely validate all user identities to prevent unauthorised access

Using real-time smart intelligence to build a deeper context of who the user is, the device they are using, where they are located at time of access and any changes in their immediate environment that may pose a security risk.