Developers: | Tanais |
Date of the premiere of the system: | 2016/07/31 |
Technology: | Cybersecurity - Authentication, ACS are Control and management systems for access |
Tanais: The connector to IDM systems (Identity Management System/management accounts and user rights of an information system) — technical solution which allows to automate management processes and audit of lifecycle of accounts and access rights of users of century EDMS Directum.
IDM systems in general are designed to optimize costs of the companies for administration of constantly developing IT infrastructure and allow to manage process of access for employees (and also third-party users) to corporate information resources. However connectors are necessary for interaction of an IDM system with information systems of the company. The solution developed by Tanais provides access to subjects of the Directum system.
Features
The connector to IDM systems from Tanais allows the administrator or the internal security specialist, using the interface of an IDM system, to manage on a centralized basis access rights to the Directum system, to create and change, block and unblock accounts of users, to create and look for a number of objects, to look for records of certain reference books.
Use of the interface of an IDM system does process of interaction of systems imperceptible for the user.
Business effect
- Use of an IDM system with the connector to Directum reduces the probability of a zadvaivaniye of data at information input in several systems.
- Security officers have an opportunity to control access rights in information systems.
- Using an IDM system with the connector to Directum it is possible to trace and execute quickly regulations of separation of responsibility and inventory of access rights of users.
- An IDM system with the connector to Directum allows to accelerate processes of management of access and to reduce costs for administration.
- Use of the connector for an IDM system to Directum allows to optimize work of employees, to lower the costs connected with waiting of providing access rights and risks of cybersecurity, to fulfill a number of the requirements of regulators.