Users authenticate once and are presented with a portal page showing the apps and sites that they’re entitled to access.
Users have the freedom to work anytime, anywhere and from any device, without being repeatedly challenged for an ever increasing number of credentials. This enterprise level Identity Access Management (IAM) service comes with an integrated self-service password reset workflow, dramatically reducing the cost of password related calls to helpdesks.
ConnectID SSO supports all major browsers—including Internet Explorer, Chrome, Firefox and Safari—as well as apps for both iOS and Android.
App Shaping offers on-premises-equivalent access control to any web application, without lengthy and expensive customization.
You can also control which browser functions are available when using a particular application. Menu items such as Copy and Print can be disabled when viewing sensitive reports, for example, in addition to preventing extracts of data using in-built export features within applications. By controlling not only application functionality but also browser activity the ability to misuse and abuse applications is further reduced.
Masking Sensitive Data
Mask or redact sensitive or regulated data—including personally identifiable information—that would ordinarily be visible in the browser window based on user role. This masking feature can be used with any web application, including legacy applications, avoiding costly development or replacement.
Application features and functions that give users the potential to misuse and abuse applications and associated data can be disabled, or removed from the page entirely.
– Make social media sites read-only when accessed from company-provided devices.
– Allow the use of web mail but perhaps remove the ability to attach files to messages.
– Adopt cloud-based productivity applications without the ability to save copies of documents and spreadsheets locally to any device.
ConnectID Enterprise providies a detailed audit trail of all user interaction with applications—from login to logout, and everything in between.
VISUAL EVIDENCE: The use of specific features within applications can be monitored—with the option to capture screen shots for particular actions—enabling the organization to provide visual evidence of exactly what the user did or didn’t see.
USER SPECIFIC AUDIT TRAIL: Access to the audit trail on Info Exchange Cloud is controlled through role-based access to ConnectID Enterprise. The audit trail can be easily searched to find specific information relating to a user, application, or application feature.
EASY MANAGEMENT: A full management dashboard is provided giving summary views of all user-application interaction, and where unusual or suspicious activity is immediately highlighted enabling exceptions to be handled quickly.
Uniquely placed within the browser between the user and the applications they access, ConnectID Enterprise provides total visibility of all user activity within any web application—including Single Page Interface (SPI) applications where user interaction may not result in a change in URL or communication with the application server.
ConnectID is uniquely flexible and can be formatted to meet your audit needs. Auditing levels can be configured for both individual applications as well as groups of users. You decide whether you want to capture just login and logout events or every page load. Plus, auditing can be limited to only applications under management or extended to all browser activity across managed and unmanaged applications and sites.
Thank You for showing interest in our newsletter.