SlideShare a Scribd company logo
1 of 4
Download to read offline
AS
emAS Identity and Access
Management System
Sponsored by Controller of Certifying Authorities,
Ministry of InformationTechnology, Govt. of India
AATLAccredited
A Feature Packed IAM Solutions that
Enables Digital Trust
We’ve all heard of IAM’s and their importance in main-
taining security in your organization. However, we felt
that they were inadequate or often needed to plug into
different systems for Multi-factor authentication to
enable secure sign on. So we created emAS - IAM
Sophisticated Multifactor Authentication
Engine
emAS IAM comes with the ability to authenticate 15+
forms of authentication right up from Advanced Pass-
word and Crypto Token/Digital Signature based authen-
tication to Facial, Grid, Behavioral Analytics and QR
Code based authentication. Authentication is an import-
ant part of security in an IAM so we wanted to ensure
nothing is lacking on this end.
Web Single Sign On with App Dashboard
emAS IAM supports Single Sign On through common
protocols such as SAML, OAUTH, AD, LDAP with manual
or auto provisioning functionality.
End-to-end Access Management
In emAS IAM, access request workflows can be defined
based on the application and resources. Even multi-lev-
el approval based access request workflows can be
defined where in multiple users (authorized to
approve/reject the request) are required to approve the
request.
Standards Compliant, User Friendly
and Easily Deployable IAM System
Adaptive Authentication Framework Using Risk
Weights and Anomaly Detection
emAS IAM combines state-of-the-art analytics and
risk-based authentication technologies to measure the risk
associated with a user’s login and post-login activities and
prompt for additional identity assurance in scenarios that
are deemed high risk and/or in violation of rules established
by your organization.
Automated User Provisioning Using LDAP/AD
emAS IAM supports internal and external user provisioning
using LDAP/AD. Further, there is the option to enable
auto-provisioning where the system will automate the user
provisioning entirely. For manual provisioning, users can
bulk upload data or go one by one (for smaller organiza-
tions).
Advanced Reporting
emAS IAM supports creation and automation of many
reports and extraction of historic data. The reporting
module allows role based access to view or edit/create
reports.
End-to-end security
Cost effective deployment supported by one
line API integration
Super-fast processing of authentication
requests
Platform agnostic – easily deployed or migrat-
ed across Solaris/Window server/Red Hat
Enterprise/ Linux/AI
Ability to provide managed services
Mobility enabled for leveraging mobile
authentication options
Acceptance of global CA certificates for Digital
Signature Certificate & Public Key Infrastruc-
ture based authentication
Built for the future with FIDO Compliance
measures
A new age public sector bank offering a broad
array of financial products used eMudhra’s
MFA powered Identity and Access Manage-
ment solution to mitigate risks involved in
supporting alternate banking channels.
“We have been able to take the lead in imple-
menting digital signature enabled strong
authentication to provide comprehensive
security as well as seamless customer
experience, thanks to eMudhra’s support.”
— Deputy General Manager, New Age
Public Sector Bank
Success StoriesProduct Benefits
eservices@emudhra.com
emAS IAM conforms with all the global standards
around Single Sign On, Multi-factor Authentication &
PKI. It is extremely user friendly with a quicker than
average deployment time and is perhaps one of the few
IAM systems with PKI functionality.
Technical Details
Authentication Mode
SMS OTP, APP OTP, eOTP, QR Code, Digital
Signature, 2FA, knowledge based, grid based,
smart card, token based, tOTP, Adaptive
authentication, biometric, IRIS, parameter
based MFA, FIDO U2F
Access Management
Resource level, Application Level
Encryption
User data storage encrypted (AES 256)
Appserver Supported
Apache Tomcat 7+, JBoss 7+, Web Sphere 8+,
Web Logic 12+
Log Management
SIEM Integration supported, en-suite log
management
Recommended Hardware
Processor: 2 * Quad Core Processors
RAM: 16 GB
HDD: 500 GB SAS HDD
OS Compatibility
Microsoft Windows 7 x64, 10 x64; Windows
Server 2008 R2 x64, 2012 R2 x64, 2016 x64
Red Hat Enterprise Linux AS/ES 6 x64, 6 x86, 7
x64; SUSE Enterprise Linux 11 x64 SP2, 12 x64
Oracle Solaris 11 (SPARC), Oracle Solaris 11
x64
IBM AIX 7.1 (POWER6, POWER8), HP-UX 11i v3
Oracle Enterprise Linux 6.8 x64 and 7.1 x64
Single Sign On Protocols
OAUTH, SAML, True SSO, Federated SSO
User Provisioning Methods
Manual user provisioning, auto provisioning,
de-provisioning, re-provisioning
Modules
User Creation Engine
Handles user management including user
creation and approval workflow for user entitle-
ment
User Authentication
15+ modes of authentication + SSO supported
Policy Enforcement
Set resource/app specific policy, define policy
matrix, monitor violations, set policy for block-
ing attempts
Credential Management
2FA, MFA, admin/user based enrollment,
user change/reset password
Workflow Management
Prevent policy violations, allow ‘request for
access’ requests, rapid deployment with
custom applications
Session Management
Manage multiple application sessions
US
About eMudhra:
© eMudhra. All Rights Reserved.
Much like the name, which is an embodiment of the seal of
authenticity in the electronic or digital world, eMudhra is a cyber
security solutions company and a trust service provider that is
focused on accelerating the world’s transition to a secure integrated
digital society. With presence in 5 continents and a global delivery
center in Bengaluru, India, eMudhra is empowering secure digital
transformation of over 45 global banks, several Fortune 100
customers and thousands of SMEs.
eservices@emudhra.com

More Related Content

What's hot

SSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsSSO Strategy Implementation Considerations
SSO Strategy Implementation Considerations
John Bauer
 
OWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.pptOWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.ppt
webhostingguy
 
CA CloudMinder Vasu Surabhi
CA CloudMinder Vasu SurabhiCA CloudMinder Vasu Surabhi
CA CloudMinder Vasu Surabhi
Vasu Surabhi
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - Vasu
Vasu Surabhi
 

What's hot (20)

Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
PROACTEYE ACCESS MANAGEMENT
PROACTEYE ACCESS MANAGEMENTPROACTEYE ACCESS MANAGEMENT
PROACTEYE ACCESS MANAGEMENT
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
 
SSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsSSO Strategy Implementation Considerations
SSO Strategy Implementation Considerations
 
OWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.pptOWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.ppt
 
Ca siteminder
Ca siteminderCa siteminder
Ca siteminder
 
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study :  iFour consultancySingle sign on - benefits, challenges and case study :  iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancy
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overview
 
SiteMinder
SiteMinderSiteMinder
SiteMinder
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
Single sign on - SSO
Single sign on - SSOSingle sign on - SSO
Single sign on - SSO
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
CA CloudMinder Vasu Surabhi
CA CloudMinder Vasu SurabhiCA CloudMinder Vasu Surabhi
CA CloudMinder Vasu Surabhi
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - Vasu
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 

Similar to eMAS Indentity and Access Management

Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.
sflynn073
 
Data power use cases
Data power use casesData power use cases
Data power use cases
sflynn073
 
Delegation
DelegationDelegation
Delegation
NetBR
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data power
sflynn073
 

Similar to eMAS Indentity and Access Management (20)

eMAS Multifactor Authentication
eMAS Multifactor AuthenticationeMAS Multifactor Authentication
eMAS Multifactor Authentication
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
Password Express - Data Sheet
Password Express - Data SheetPassword Express - Data Sheet
Password Express - Data Sheet
 
WebSphere Integration User Group 13 July 2015 : DataPower session
WebSphere Integration User Group 13 July 2015 : DataPower sessionWebSphere Integration User Group 13 July 2015 : DataPower session
WebSphere Integration User Group 13 July 2015 : DataPower session
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015
 
Datapower Steven Cawn
Datapower Steven CawnDatapower Steven Cawn
Datapower Steven Cawn
 
Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
iPlanet presentation
iPlanet presentationiPlanet presentation
iPlanet presentation
 
Access Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAEAccess Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAE
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
Data power use cases
Data power use casesData power use cases
Data power use cases
 
Delegation
DelegationDelegation
Delegation
 
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use CasesIBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use Cases
 
Datapowercommonusecases 130509114200-phpapp02
Datapowercommonusecases 130509114200-phpapp02Datapowercommonusecases 130509114200-phpapp02
Datapowercommonusecases 130509114200-phpapp02
 
Datapowercommonusecases 130509114200-phpapp02
Datapowercommonusecases 130509114200-phpapp02Datapowercommonusecases 130509114200-phpapp02
Datapowercommonusecases 130509114200-phpapp02
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data power
 

More from Kalyana Sundaram

More from Kalyana Sundaram (6)

eMStream
eMStreameMStream
eMStream
 
eMsecure
eMsecureeMsecure
eMsecure
 
eMsigner
eMsignereMsigner
eMsigner
 
eMCA Suite
eMCA SuiteeMCA Suite
eMCA Suite
 
eMBlock
eMBlockeMBlock
eMBlock
 
Krish IT Profile
Krish IT ProfileKrish IT Profile
Krish IT Profile
 

Recently uploaded

Recently uploaded (20)

WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdfAzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAMWSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
 
WSO2Con2024 - Low-Code Integration Tooling
WSO2Con2024 - Low-Code Integration ToolingWSO2Con2024 - Low-Code Integration Tooling
WSO2Con2024 - Low-Code Integration Tooling
 
WSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid EnvironmentsWSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid Environments
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
 
WSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in UgandaWSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in Uganda
 

eMAS Indentity and Access Management

  • 1. AS emAS Identity and Access Management System Sponsored by Controller of Certifying Authorities, Ministry of InformationTechnology, Govt. of India AATLAccredited
  • 2. A Feature Packed IAM Solutions that Enables Digital Trust We’ve all heard of IAM’s and their importance in main- taining security in your organization. However, we felt that they were inadequate or often needed to plug into different systems for Multi-factor authentication to enable secure sign on. So we created emAS - IAM Sophisticated Multifactor Authentication Engine emAS IAM comes with the ability to authenticate 15+ forms of authentication right up from Advanced Pass- word and Crypto Token/Digital Signature based authen- tication to Facial, Grid, Behavioral Analytics and QR Code based authentication. Authentication is an import- ant part of security in an IAM so we wanted to ensure nothing is lacking on this end. Web Single Sign On with App Dashboard emAS IAM supports Single Sign On through common protocols such as SAML, OAUTH, AD, LDAP with manual or auto provisioning functionality. End-to-end Access Management In emAS IAM, access request workflows can be defined based on the application and resources. Even multi-lev- el approval based access request workflows can be defined where in multiple users (authorized to approve/reject the request) are required to approve the request. Standards Compliant, User Friendly and Easily Deployable IAM System Adaptive Authentication Framework Using Risk Weights and Anomaly Detection emAS IAM combines state-of-the-art analytics and risk-based authentication technologies to measure the risk associated with a user’s login and post-login activities and prompt for additional identity assurance in scenarios that are deemed high risk and/or in violation of rules established by your organization. Automated User Provisioning Using LDAP/AD emAS IAM supports internal and external user provisioning using LDAP/AD. Further, there is the option to enable auto-provisioning where the system will automate the user provisioning entirely. For manual provisioning, users can bulk upload data or go one by one (for smaller organiza- tions). Advanced Reporting emAS IAM supports creation and automation of many reports and extraction of historic data. The reporting module allows role based access to view or edit/create reports. End-to-end security Cost effective deployment supported by one line API integration Super-fast processing of authentication requests Platform agnostic – easily deployed or migrat- ed across Solaris/Window server/Red Hat Enterprise/ Linux/AI Ability to provide managed services Mobility enabled for leveraging mobile authentication options Acceptance of global CA certificates for Digital Signature Certificate & Public Key Infrastruc- ture based authentication Built for the future with FIDO Compliance measures A new age public sector bank offering a broad array of financial products used eMudhra’s MFA powered Identity and Access Manage- ment solution to mitigate risks involved in supporting alternate banking channels. “We have been able to take the lead in imple- menting digital signature enabled strong authentication to provide comprehensive security as well as seamless customer experience, thanks to eMudhra’s support.” — Deputy General Manager, New Age Public Sector Bank Success StoriesProduct Benefits eservices@emudhra.com emAS IAM conforms with all the global standards around Single Sign On, Multi-factor Authentication & PKI. It is extremely user friendly with a quicker than average deployment time and is perhaps one of the few IAM systems with PKI functionality.
  • 3. Technical Details Authentication Mode SMS OTP, APP OTP, eOTP, QR Code, Digital Signature, 2FA, knowledge based, grid based, smart card, token based, tOTP, Adaptive authentication, biometric, IRIS, parameter based MFA, FIDO U2F Access Management Resource level, Application Level Encryption User data storage encrypted (AES 256) Appserver Supported Apache Tomcat 7+, JBoss 7+, Web Sphere 8+, Web Logic 12+ Log Management SIEM Integration supported, en-suite log management Recommended Hardware Processor: 2 * Quad Core Processors RAM: 16 GB HDD: 500 GB SAS HDD OS Compatibility Microsoft Windows 7 x64, 10 x64; Windows Server 2008 R2 x64, 2012 R2 x64, 2016 x64 Red Hat Enterprise Linux AS/ES 6 x64, 6 x86, 7 x64; SUSE Enterprise Linux 11 x64 SP2, 12 x64 Oracle Solaris 11 (SPARC), Oracle Solaris 11 x64 IBM AIX 7.1 (POWER6, POWER8), HP-UX 11i v3 Oracle Enterprise Linux 6.8 x64 and 7.1 x64 Single Sign On Protocols OAUTH, SAML, True SSO, Federated SSO User Provisioning Methods Manual user provisioning, auto provisioning, de-provisioning, re-provisioning Modules User Creation Engine Handles user management including user creation and approval workflow for user entitle- ment User Authentication 15+ modes of authentication + SSO supported Policy Enforcement Set resource/app specific policy, define policy matrix, monitor violations, set policy for block- ing attempts Credential Management 2FA, MFA, admin/user based enrollment, user change/reset password Workflow Management Prevent policy violations, allow ‘request for access’ requests, rapid deployment with custom applications Session Management Manage multiple application sessions
  • 4. US About eMudhra: © eMudhra. All Rights Reserved. Much like the name, which is an embodiment of the seal of authenticity in the electronic or digital world, eMudhra is a cyber security solutions company and a trust service provider that is focused on accelerating the world’s transition to a secure integrated digital society. With presence in 5 continents and a global delivery center in Bengaluru, India, eMudhra is empowering secure digital transformation of over 45 global banks, several Fortune 100 customers and thousands of SMEs. eservices@emudhra.com