icon

Identity and Access Management Services

List of IAM Services Compatible with Hideez Authentication Service

If your workers have only the permissions they need, then random malfunctions in the operation of your services due to the "human factor" simply disappear. The modern digital world requires efficient and secure management of access to various resources and identification of users thanks to specialized services. Such services have become an integral part of information technology, providing secure access to systems, data and services. These services include a variety of methods and tools to identify an individual, verify their authenticity, and provide the appropriate level of access according to rights and restrictions.

Thanks to these services, organizations can control which users have access to specific resources, applications or information. They provide business information security by using various authentication methods such as passwords, biometrics, tokens, etc. This prevents unauthorized access to confidential information and abuse of privileges, as well as providing convenience for users and simplifying the authorization process. On this page, we'll look at the various types of access and identity management services and how to configure them with compatible Hideez Authentiction Service.
Azure Active Directory

Microsoft Azure AD

Microsoft Azure Active Directory (Azure AD) serves as a cloud-centric solution for managing identity and access. Functioning as a cloud directory and identity management service, it provides authentication and authorization functionalities across a spectrum of Microsoft offerings, including Microsoft 365, Dynamics 365, Azure, and cloud-based applications.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

AWS

AWS IAM

AWS IAM empowers you to securely administer access to AWS services and resources. With AWS IAM, you have the capability to establish users and allocate them with personalized access credentials, ensuring robust security measures.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Okta

Okta

Gain effortless access to all your company's programs with Okta's unified cloud platform. With a single login, seamlessly connect to essential tools like Slack, Zoom, Gmail, and Figma. Whether on a computer, tablet, or phone, Okta ensures convenient access from anywhere, anytime.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

AWS

AWS Single Sign-On

AWS Single Sign-On (SSO) facilitates easy centralized management and provision of unified access for users across multiple AWS accounts and business applications from one central hub. AWS SSO also integrates WebAuthn for enhanced verification and protection against phishing attempts.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Avatier

Avatier

Avatier offers an identity management platform that empowers organizations globally to grow rapidly, innovate quickly, and embrace change more effectively. Avatier solutions are customized to meet the requirements of business users and establish a cohesive framework for business operations across the board.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

AuthLite

Authlite

A software that seamlessly integrates with your existing Active Directory authentication, enabling you to specify which users, systems, and processes will utilize the two-factor method.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Auth0

Auth0

An identity platform for enterprises providing a range of authentication services, including versatile login options such as multi-factor authentication and single sign-on.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

CodeEnigma

CodeEnigma

Code Enigma offers a holistic solution for organization-wide identity and authentication management. Through managed authentication services, organizations can implement the Hideez Key OTP for 2.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Curity

RPre-built solutions for seamless integration with the identity system, expediting digital transformation. The Curity Identity Server merges identity security and APIs to ensure dependable authentication and authorization.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

DUO Security

DUO Security

The creator of ID systems confirms user identities and device status prior to application access, enhancing cybersecurity defense against potential breaches.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Daon

Daon

A versatile platform equipped to meet the evolving needs of identity management, ensuring secure access and streamlined authentication processes through multi-factor authentication.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Hello ID

HelloID

Tools4ever offers a comprehensive cloud-based solution for managing identity and access. Gain secure access to all your cloud applications from anywhere using SSO, and implement additional security measures through access policies and MFA.

Compatible authentication methods:

Supported protocols:

Operating systems:

Browsers:

Identity Automation

Identity Automation

Identity management software that optimizes IT expenditure. This platform prioritizes intelligent automation, access provisioning, and account management. Incorporate Hideez tools with RapidIdentity for robust phishing protection.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

LogonBox

LogonBox

LogonBox offers unified login, password management, and remote access control through cloud-based or on-premises services. LogonBox, in partnership with Hideez, resolves password forgetfulness, easing the workload on your IT team.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

OneLogin

OneLogin

The creator of ID systems confirms user identities and device status prior to application access, enhancing cybersecurity defense against potential breaches.

Compatible authetication methods:

Supported protocols:

Operating systems:

Radiant Logic

RadiantOne

RadiantOne FID is an identity and directory service that offers a consolidated perspective on user groups, facilitating authorization for security initiatives, consolidation, and YubiKey-based authentication.

Compatible authentication methods:

Supported protocols:

Operating systems:

Browsers:

RSA

RSA SecurID® Access

Multi-factor authentication software that mitigates identification risks by integrating local and cloud components into a singular solution through a distinctive hybrid model.

Compatible authetication methods:

Supported protocols:

Operating systems:

ilex international

Sign&go Global SSO

Tools4ever offers a comprehensive cloud-based solution for managing identity and access. Gain secure access to all your cloud applications from anywhere using SSO, and implement additional security measures through access policies and MFA.

Compatible authentication methods:

Supported protocols:

Operating systems:

Browsers:

neXus

Smart ID Digital Access

Multi-factor authentication for digital access. Enables clients to centrally manage and protect the complete lifecycle of user identification data, both digital and physical, in a secure and centralized manner.

Compatible authentication methods:

Supported protocols:

Operating systems:

Browsers:

Shibboleth

Shibboleth

Shibboleth stands as a prominent SAML implementation adopted by higher education institutions globally. Since 2003, hundreds of universities have relied on Shibboleth to safeguard access.


Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

UserLock

UserLock

UserLock simplifies the implementation of MFA for Windows, RDP, RD Gateway, VPN, IIS, and cloud applications. Authenticate all Active Directory accounts and safeguard their network and cloud service access.

Compatible authentication methods:

Supported protocols:

Operating systems:

Browsers:

Unlock advanced security capabilities With Passwordless SSO and Proximity-Based Authentication for Workforce.