icon

Services de gestion des identités et des accès

Liste des services IAM compatibles avec le service d'authentification Hideez

Si vos employés disposent uniquement des autorisations dont ils ont besoin, les dysfonctionnements aléatoires dans le fonctionnement de vos services dus au « facteur humain » disparaissent tout simplement. Le monde numérique moderne nécessite une gestion efficace et sécurisée de l’accès aux diverses ressources et une identification des utilisateurs grâce à des services spécialisés. Ces services font désormais partie intégrante des technologies de l’information, offrant un accès sécurisé aux systèmes, aux données et aux services. Ces services comprennent une variété de méthodes et d'outils pour identifier un individu, vérifier son authenticité et fournir le niveau d'accès approprié en fonction des droits et des restrictions.

Grâce à ces services, les organisations peuvent contrôler quels utilisateurs ont accès à des ressources, applications ou informations spécifiques. Ils assurent la sécurité des informations commerciales en utilisant diverses méthodes d'authentification telles que des mots de passe, des données biométriques, des jetons, etc. Cela empêche l'accès non autorisé aux informations confidentielles et l'abus de privilèges, tout en offrant une commodité aux utilisateurs et en simplifiant le processus d'autorisation. Sur cette page, nous examinerons les différents types de services de gestion d'accès et d'identité et comment les configurer avec le service d'authentification Hideez compatible.
Azure Active Directory

Microsoft Azure AD

Microsoft Azure Active Directory (Azure AD) serves as a cloud-centric solution for managing identity and access. Functioning as a cloud directory and identity management service, it provides authentication and authorization functionalities across a spectrum of Microsoft offerings, including Microsoft 365, Dynamics 365, Azure, and cloud-based applications.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

AWS

AWS IAM

AWS IAM empowers you to securely administer access to AWS services and resources. With AWS IAM, you have the capability to establish users and allocate them with personalized access credentials, ensuring robust security measures.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Okta

Okta

Gain effortless access to all your company's programs with Okta's unified cloud platform. With a single login, seamlessly connect to essential tools like Slack, Zoom, Gmail, and Figma. Whether on a computer, tablet, or phone, Okta ensures convenient access from anywhere, anytime.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

AWS

AWS Single Sign-On

AWS Single Sign-On (SSO) facilitates easy centralized management and provision of unified access for users across multiple AWS accounts and business applications from one central hub. AWS SSO also integrates WebAuthn for enhanced verification and protection against phishing attempts.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Avatier

Avatier

Avatier offers an identity management platform that empowers organizations globally to grow rapidly, innovate quickly, and embrace change more effectively. Avatier solutions are customized to meet the requirements of business users and establish a cohesive framework for business operations across the board.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

AuthLite

Authlite

A software that seamlessly integrates with your existing Active Directory authentication, enabling you to specify which users, systems, and processes will utilize the two-factor method.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Auth0

Auth0

An identity platform for enterprises providing a range of authentication services, including versatile login options such as multi-factor authentication and single sign-on.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

CodeEnigma

CodeEnigma

Code Enigma offers a holistic solution for organization-wide identity and authentication management. Through managed authentication services, organizations can implement the Hideez Key OTP for 2.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Curity

RPre-built solutions for seamless integration with the identity system, expediting digital transformation. The Curity Identity Server merges identity security and APIs to ensure dependable authentication and authorization.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

DUO Security

DUO Security

The creator of ID systems confirms user identities and device status prior to application access, enhancing cybersecurity defense against potential breaches.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Daon

Daon

A versatile platform equipped to meet the evolving needs of identity management, ensuring secure access and streamlined authentication processes through multi-factor authentication.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

Hello ID

HelloID

Tools4ever offers a comprehensive cloud-based solution for managing identity and access. Gain secure access to all your cloud applications from anywhere using SSO, and implement additional security measures through access policies and MFA.

Compatible authentication methods:

Supported protocols:

Operating systems:

Browsers:

Identity Automation

Identity Automation

Identity management software that optimizes IT expenditure. This platform prioritizes intelligent automation, access provisioning, and account management. Incorporate Hideez tools with RapidIdentity for robust phishing protection.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

LogonBox

LogonBox

LogonBox offers unified login, password management, and remote access control through cloud-based or on-premises services. LogonBox, in partnership with Hideez, resolves password forgetfulness, easing the workload on your IT team.

Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

OneLogin

OneLogin

The creator of ID systems confirms user identities and device status prior to application access, enhancing cybersecurity defense against potential breaches.

Compatible authetication methods:

Supported protocols:

Operating systems:

Radiant Logic

RadiantOne

RadiantOne FID is an identity and directory service that offers a consolidated perspective on user groups, facilitating authorization for security initiatives, consolidation, and YubiKey-based authentication.

Compatible authentication methods:

Supported protocols:

Operating systems:

Browsers:

RSA

RSA SecurID® Access

Multi-factor authentication software that mitigates identification risks by integrating local and cloud components into a singular solution through a distinctive hybrid model.

Compatible authetication methods:

Supported protocols:

Operating systems:

ilex international

Sign&go Global SSO

Tools4ever offers a comprehensive cloud-based solution for managing identity and access. Gain secure access to all your cloud applications from anywhere using SSO, and implement additional security measures through access policies and MFA.

Compatible authentication methods:

Supported protocols:

Operating systems:

Browsers:

neXus

Smart ID Digital Access

Multi-factor authentication for digital access. Enables clients to centrally manage and protect the complete lifecycle of user identification data, both digital and physical, in a secure and centralized manner.

Compatible authentication methods:

Supported protocols:

Operating systems:

Browsers:

Shibboleth

Shibboleth

Shibboleth stands as a prominent SAML implementation adopted by higher education institutions globally. Since 2003, hundreds of universities have relied on Shibboleth to safeguard access.


Compatible authetication methods:

Supported protocols:

Operating systems:

Browsers:

UserLock

UserLock

UserLock simplifies the implementation of MFA for Windows, RDP, RD Gateway, VPN, IIS, and cloud applications. Authenticate all Active Directory accounts and safeguard their network and cloud service access.

Compatible authentication methods:

Supported protocols:

Operating systems:

Browsers:

Unlock advanced security capabilities With Passwordless SSO and Proximity-Based Authentication for Workforce.