icon

Servicios de gestión de identidad y acceso

Lista de servicios IAM compatibles con el servicio de autenticación Hideez

Si sus trabajadores tienen sólo los permisos que necesitan, entonces los fallos aleatorios en el funcionamiento de sus servicios debido al "factor humano" simplemente desaparecen. El mundo digital moderno requiere una gestión eficiente y segura del acceso a diversos recursos y la identificación de los usuarios gracias a servicios especializados. Estos servicios se han convertido en una parte integral de la tecnología de la información, proporcionando acceso seguro a sistemas, datos y servicios. Estos servicios incluyen una variedad de métodos y herramientas para identificar a un individuo, verificar su autenticidad y proporcionar el nivel adecuado de acceso según sus derechos y restricciones.

Gracias a estos servicios, las organizaciones pueden controlar qué usuarios tienen acceso a recursos, aplicaciones o información específicos. Proporcionan seguridad de la información empresarial mediante el uso de diversos métodos de autenticación, como contraseñas, datos biométricos, tokens, etc. Esto evita el acceso no autorizado a información confidencial y el abuso de privilegios, además de brindar comodidad a los usuarios y simplificar el proceso de autorización. En esta página, veremos los distintos tipos de servicios de administración de identidad y acceso y cómo configurarlos con el servicio de autenticación Hideez compatible.
Azure Active Directory

Microsoft Azure AD

Microsoft Azure Active Directory (Azure AD) serves as a cloud-centric solution for managing identity and access. Functioning as a cloud directory and identity management service, it provides authentication and authorization functionalities across a spectrum of Microsoft offerings, including Microsoft 365, Dynamics 365, Azure, and cloud-based applications.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

AWS

AWS IAM

AWS IAM empowers you to securely administer access to AWS services and resources. With AWS IAM, you have the capability to establish users and allocate them with personalized access credentials, ensuring robust security measures.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Okta

Okta

Gain effortless access to all your company's programs with Okta's unified cloud platform. With a single login, seamlessly connect to essential tools like Slack, Zoom, Gmail, and Figma. Whether on a computer, tablet, or phone, Okta ensures convenient access from anywhere, anytime.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

AWS

AWS Single Sign-On

AWS Single Sign-On (SSO) facilitates easy centralized management and provision of unified access for users across multiple AWS accounts and business applications from one central hub. AWS SSO also integrates WebAuthn for enhanced verification and protection against phishing attempts.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Avatier

Avatier

Avatier offers an identity management platform that empowers organizations globally to grow rapidly, innovate quickly, and embrace change more effectively. Avatier solutions are customized to meet the requirements of business users and establish a cohesive framework for business operations across the board.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

AuthLite

Authlite

A software that seamlessly integrates with your existing Active Directory authentication, enabling you to specify which users, systems, and processes will utilize the two-factor method.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Auth0

Auth0

An identity platform for enterprises providing a range of authentication services, including versatile login options such as multi-factor authentication and single sign-on.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

CodeEnigma

CodeEnigma

Code Enigma offers a holistic solution for organization-wide identity and authentication management. Through managed authentication services, organizations can implement the Hideez Key OTP for 2.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Curity

RPre-built solutions for seamless integration with the identity system, expediting digital transformation. The Curity Identity Server merges identity security and APIs to ensure dependable authentication and authorization.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

DUO Security

DUO Security

The creator of ID systems confirms user identities and device status prior to application access, enhancing cybersecurity defense against potential breaches.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Daon

Daon

A versatile platform equipped to meet the evolving needs of identity management, ensuring secure access and streamlined authentication processes through multi-factor authentication.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Hello ID

HelloID

Tools4ever offers a comprehensive cloud-based solution for managing identity and access. Gain secure access to all your cloud applications from anywhere using SSO, and implement additional security measures through access policies and MFA.

Compatible authentication methods:

Supported protocols:

Operating systems:

Browsers:

Identity Automation

Identity Automation

Identity management software that optimizes IT expenditure. This platform prioritizes intelligent automation, access provisioning, and account management. Incorporate Hideez tools with RapidIdentity for robust phishing protection.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

LogonBox

LogonBox

LogonBox offers unified login, password management, and remote access control through cloud-based or on-premises services. LogonBox, in partnership with Hideez, resolves password forgetfulness, easing the workload on your IT team.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

OneLogin

OneLogin

The creator of ID systems confirms user identities and device status prior to application access, enhancing cybersecurity defense against potential breaches.

Compatible authetication methods:

Supported protocols:

Operating systems:

Radiant Logic

RadiantOne

RadiantOne FID is an identity and directory service that offers a consolidated perspective on user groups, facilitating authorization for security initiatives, consolidation, and YubiKey-based authentication.

Compatible authentication methods:

Supported protocols:

Operating systems:

Browsers:

RSA

RSA SecurID® Access

Multi-factor authentication software that mitigates identification risks by integrating local and cloud components into a singular solution through a distinctive hybrid model.

Compatible authetication methods:

Supported protocols:

Operating systems:

ilex international

Sign&go Global SSO

Tools4ever offers a comprehensive cloud-based solution for managing identity and access. Gain secure access to all your cloud applications from anywhere using SSO, and implement additional security measures through access policies and MFA.

Compatible authentication methods:

Supported protocols:

Operating systems:

Browsers:

neXus

Smart ID Digital Access

Multi-factor authentication for digital access. Enables clients to centrally manage and protect the complete lifecycle of user identification data, both digital and physical, in a secure and centralized manner.

Compatible authentication methods:

Supported protocols:

Operating systems:

Browsers:

Shibboleth

Shibboleth

Shibboleth stands as a prominent SAML implementation adopted by higher education institutions globally. Since 2003, hundreds of universities have relied on Shibboleth to safeguard access.


Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

UserLock

UserLock

UserLock simplifies the implementation of MFA for Windows, RDP, RD Gateway, VPN, IIS, and cloud applications. Authenticate all Active Directory accounts and safeguard their network and cloud service access.

Compatible authentication methods:

Supported protocols:

Operating systems:

Browsers:

Discover advanced security capabilities with Passwordless SSO and proximity-based authentication for your workforce