Authen2cate provides a number of directory-related services to meet our clients’ needs. We can act as the primary directory in the cloud for all your enabled applications or leverage your internal directory (LDAP or AD) as the primary source for user identities.
If redundancy is a concern, your information can be readily available across our multiple data center locations either through Authen2cate acting as the primary directory, or by replicating and syncing your directory structure with us.
Whether you are hosting your own directory services, searching for a reliable company to host them, or a combination of both, Authen2cate has a solution that’s right for you.
A2C Universal Directory
Authen2cate provides a universal directory with many useful benefits. The directory can be used as your primary directory, as a secondary directory for users that you may not want to include in your primary AD, or a duplicate directory as a backup if your primary AD is unavailable.
Authen2cate can also connect to an organization’s AD or LDAP services using our secure A2C Connect proxy. The proxy is installed behind the protection of your firewall and creates a secure connection with the Authen2cate IAM platform.
Advanced Directory Services
Authen2cate’s advanced directory services allow the use of multiple disparate directories to authenticate users. Companies often merge and purchase new systems that use proprietary directories. We seamlessly check all directories to securely authenticate the user and allow access to the assigned applications.
Automated Provisioning and De-Provisioning
One of the critical requirements of all compliance standards is not only creating access for a new user, but also making sure that when a user leaves the organization, access is revoked. Authen2cate’s solution allows the administrator to seamlessly and automatically provision a new user by simply adding them to the application group in the directory. Applications like Office 365, Salesforce, Oracle, SAP, and many more take only a few minutes to deploy.
Comprehensive Reporting Capabilities
When a user leaves the organization, simply delete them from your directory or remove them from the application group, and access is terminated for all applications they had previously been assigned.
Another critical requirement to meet compliance standards is reporting. Our custom reporting tool allows you to add to our standard reports to help any organization monitor and manage access to critical information in real time.
- Who has access to what applications
- When users accessed the system
- New users added
- Users deleted
- Virtually all data is captured and recorded