Identity and Access Management
GET BACK THE CONTROL OF YOUR IDENTITIES.
We created for you a central solution to fully manage your users’ and machines’ identities. Integrating SSO, PAM, PIM, access management, identity governance, PKI, and certificate management.
Discover ANT ID™
Your holistic and modular offering
AM (ACCESS MANAGEMENT)
AM (ACCESS MANAGEMENT)
Access Management manages the identity lifecycle with all necessary features to onboard identities from everywhere, including LDAP, Active Directory, and any kind of cloud identities. It also enables Bring Your Own Identity (BYOI) or on-premises identity onboarding, as well as central unified login through OTP, Push, Certificate, FIDO2, external IDP, and more; Hello for Business is supported both from users and machines perspectives.
The SelfService and Credentials Reset portals give users the ability to manage their authentication methods and reset their password or enable temporary emergency access. The Operation Console for Help Desk and Administration allows support personal to assist end-users in an efficient way.
The solution can be integrated with any application through open-APIs and provides SSO access for any kind of applications through standard protocols (SAML, OpenID Connect).
DIGITAL SIGNATURE
DIGITAL SIGNATURE
Digital Document Signing allows to digitally sign and verify the identity of a signer of an Adobe® PDF file. This process ensures that the document is original, has not been altered and can no longer be modified. It supports various types of signature levels, such as Qualified signatures, Advanced signatures, and corporate signing.
CA AS A SERVICE
CA AS A SERVICE
CA as a service is a complete infrastructure including Registration Authority, CRL and OSCP, to be able to deliver certificates based on your needs. It supports several automation protocols and allows you to deploy your own internal certificates without the hassle of operating a PKI infrastructure.
HSM SERVICES
HSM SERVICES
HSM as a service is a complete hardware security infrastructure based on Thales Luna 7x series. It provides an HSM partition or a full HSM as a service, and includes a formal key ceremony following the highest security standards for financial institutions, airlines or any other industries. HSM enables services such as:
- Bring Your Own Key (BYOK) for Microsoft Azure and other type of services
- Double Key Encryption (DKE)
- Bring Your Own Encryption (BYOE)
AM (ACCESS MANAGEMENT)
Access Management manages the identity lifecycle with all necessary features to onboard identities from everywhere, including LDAP, Active Directory, and any kind of cloud identities. It also enables Bring Your Own Identity (BYOI) or on-premises identity onboarding, as well as central unified login through OTP, Push, Certificate, FIDO2, external IDP, and more; Hello for Business is supported both from users and machines perspectives.
The SelfService and Credentials Reset portals give users the ability to manage their authentication methods and reset their password or enable temporary emergency access. The Operation Console for Help Desk and Administration allows support personal to assist end-users in an efficient way.
The solution can be integrated with any application through open-APIs and provides SSO access for any kind of applications through standard protocols (SAML, OpenID Connect).
DIGITAL SIGNATURE
Digital Document Signing allows to digitally sign and verify the identity of a signer of an Adobe® PDF file. This process ensures that the document is original, has not been altered and can no longer be modified. It supports various types of signature levels, such as Qualified signatures, Advanced signatures, and corporate signing.
CA AS A SERVICE
CA as a service is a complete infrastructure including Registration Authority, CRL and OSCP, to be able to deliver certificates based on your needs. It supports several automation protocols and allows you to deploy your own internal certificates without the hassle of operating a PKI infrastructure.
HSM SERVICES
HSM as a service is a complete hardware security infrastructure based on Thales Luna 7x series. It provides an HSM partition or a full HSM as a service, and includes a formal key ceremony following the highest security standards for financial institutions, airlines or any other industries. HSM enables services such as:
- Bring Your Own Key (BYOK) for Microsoft Azure and other type of services
- Double Key Encryption (DKE)
- Bring Your Own Encryption (BYOE)
CERTIFICATE AS A SERVICE
CERTIFICATE AS A SERVICE
- Ticketing integration
- Role based access
- Inventory integration
- Auditing & discovery
- Certificate cleanup
- Share Certificate
- Domain validation
- Order Management
- Designed for non-IT users
- Monitoring
- Cloud Service Connectors
- CA agnostic
- Certificate takeover
- Automation delivery
Certificate as a service is a module designed to manage the certificate lifecycle and provides all necessary workflows within one central place. Focusing on simplicity, it is based on several years of experience as a Service Provider and doesn’t need any technical knowledge. The solution is PKI agnostic and addresses public and private Certificate Authorities. By increasing efficiency and lowering certificate management costs, it provides the necessary level of compliance. The network certificates scan module provides an overview of deployed certificates and allows to detect irregularities in their implementation.
PAM (PRIVILEGE ACCESS MANAGEMENT)
PAM (PRIVILEGE ACCESS MANAGEMENT)
- Credential Management
- Task Automation
- Session recording
- Privileges Discovery
- Vaulting
Privileged Access Management – PAM manages the lifecycle of privileged accounts such as local accounts, AD accounts and service accounts, provisioned from the central management console (on-premises and in the cloud). Auto discovery is enhanced with capabilities to compare the privileges of the account with templates (like group membership) and approval is required in case of discrepancies to keep or remove the highlighted privileges. Approval and separation of duties are central points of the PAM.
IGA
IGA
- Access Request
- Life cycle
- Approval workflow
- Separation of duty
Identity governance and administration (IGA) is designed to manage the identity governance. This suite enables all necessary workflows from one central place and enables the management of provisioning on behalf, up to the completion of the deletion of the identity. It provides full flexibility to design any kind of approval, at any level and on any workflow, therefore enabling a proper separation of duties.
CERTIFICATE AS A SERVICE
- Ticketing integration
- Role based access
- Inventory integration
- Auditing & discovery
- Certificate cleanup
- Share Certificate
- Domain validation
- Order Management
- Designed for non-IT users
- Monitoring
- Cloud Service Connectors
- CA agnostic
- Certificate takeover
- Automation delivery
Certificate as a service is a module designed to manage the certificate lifecycle and provides all necessary workflows within one central place. Focusing on simplicity, it is based on several years of experience as a Service Provider and doesn’t need any technical knowledge. The solution is PKI agnostic and addresses public and private Certificate Authorities. By increasing efficiency and lowering certificate management costs, it provides the necessary level of compliance. The network certificates scan module provides an overview of deployed certificates and allows to detect irregularities in their implementation.
PAM (PRIVILEGE ACCESS MANAGEMENT)
- Credential Management
- Task Automation
- Session recording
- Privileges Discovery
- Vaulting
Privileged Access Management – PAM manages the lifecycle of privileged accounts such as local accounts, AD accounts and service accounts, provisioned from the central management console (on-premises and in the cloud). Auto discovery is enhanced with capabilities to compare the privileges of the account with templates (like group membership) and approval is required in case of discrepancies to keep or remove the highlighted privileges. Approval and separation of duties are central points of the PAM.
IGA
- Access Request
- Life cycle
- Approval workflow
- Separation of duty
Identity governance and administration (IGA) is designed to manage the identity governance. This suite enables all necessary workflows from one central place and enables the management of provisioning on behalf, up to the completion of the deletion of the identity. It provides full flexibility to design any kind of approval, at any level and on any workflow, therefore enabling a proper separation of duties.