Identity management | Password management

In most companies task like password management, creation and deletion of user accounts and rights management are handled by administrators in the IT department. And in many companies it happens that information about changes reaches them later. This can be (and often unfortunately is) a security risk.

A practical and effective solution for managing passwords and users is so-called Identity Management (IdM). A central solution that makes it possible to automate all the processes mentioned at the beginning. How?

By unifying all user accounts under a single virtual identity and defining a “user lifecycle” – from account creation to account modification to deletion. All modifications then take place “on top” of this identity and automatically. Thanks to the central solution, administrators have 100% visibility of users and their permissions, and can easily identify dormant accounts, i.e. accounts without an owner.  Users can then easily and conveniently make changes, reset passwords, request access to applications or assign permissions, for example, in this central interface themselves. In the same place, managers and then administrators approve them.

The primary data sources for Identity Management can be the HR system, CSV file, web services and others. Connection to end applications is provided by IdM software, which then communicates with the applications using adapters/connectors.

Identity Management is a simple solution for almost any company. Thinking about it?

We combine user permission management and information access control, known in the IT world as Identity and Access management, in the DPDC Identity solution. In addition to the traditional form of delivery of licenses, services and hardware, we often provide delivery in the form of “software as a service”. Software licenses, all vendor services for implementation, maintenance, development and sometimes hardware are then included in the monthly service fee. This form of identity management is favored by our customers for the reliability of the resulting operation and cost transparency.

Password Management – Single sign-on (SSO)

Minimum of 9 characters, a combination of numbers, letters and special characters  and the need to change your password every 8 weeks. Paradoxically, these security rules lead to users writing down complex passwords on paper and, in turn, make the whole system less secure. What to do about it?

The problem of multiple logins and the filling in of many long passwords is solved by the so-called implementation of single sign-on (SSO), thanks to which the user fills in only one password and does not have to enter any others. The first time the user logs in, he is redirected to the SSO server. There he enters his access data and the system verifies it. If everything is correct, it automatically redirects the user back to the application. To access another application, there is no need to fill in anything again, because the server remembers that it has verified the user’s identity and his username and password are replaced by a security token. Any changes to the security policy then only need to be made on the SSO server and there is no need to interfere with any applications.

So forget the “paper” method – passwords stuck on post-it notes under the monitor – and make life easier for your employees with Single sign-on – SSO. You’ll be rewarded not only with more data security in your company, but also a grateful IT department with minimal password management requests.