Support DevOps best practices by using Git, issue tracking. All data is protected from unauthorized access by a next-generation two-factor authentication, either by using a smartphone or a smart card. Create your free IBM Cloud account to access over 40 always-free products without time. Private cloud-storage on your own server ? With SecSign Portal by SecCommerce you can now use your own cloud service which is operated by yourself. Because sensitive corporate data needs more than simple password-based authentification.Įncryption ? Whether you need server-based encryption or client-based end-to-end encryption, we have the right solution for you. For archiving compliant to auditing requirements a qualified time stamp is required.ĭigital Mailroom ? Realization of prompt registration and forwarding of all incoming mail by using a complete digital mailroom.Īuthentification ? We offer safe authentification via SecSign ID and/or smart card. Every post item is signed after being scanned. Substitute scanning and signing (E-Files) ? Substitute scanning is provided with a SecArchive-Client in combination with the SecPKI-Server. However, it offers so much more: an open-source Java server component, support for multiple protocols, diverse integration capabilities, community documentation, and implementation support. Mobile signature ? Using the signature via transaction data to conveniently generate a mobile signature. Central Authentication Service (CAS) The last entry on our list of open-source identity management tools, the CAS offers Single Sign-On for the web. Signature-Tools & Web-Applications ? Use the SecSigner to easily and convenient prepare and verify digital signatures for documents or data or directly in the browser. Use it for HR processes, digital contracts, signature requests and custom workflows. The following sections describe each of these authentication methods in more detail.Signature Portal ? An easy and accessible solution to digitize all complex signature processes and workflows combined into one portal. All the other options require some kind of external security infrastructure (usually an authentication server or a certificate authority for issuing SSL certificates), or are platform-specific. Password authentication is the easiest choice for remote connections. Peer authentication is usually recommendable for local connections, though trust authentication might be sufficient in some circumstances. IDM can add all downloads linked to the current page. Thus IDM can access many Internet and proxy servers using login name and password. IDM supports main authentication protocols: Basic, Negotiate, NTLM, and Keberos. For example, IDM works with Microsoft ISA, and FTP proxy servers. PAM authentication, which relies on a PAM (Pluggable Authentication Modules) library.īSD authentication, which relies on the BSD Authentication framework (currently available only on OpenBSD). IDM supports many types of proxy servers. RADIUS authentication, which relies on a RADIUS authentication server.Ĭertificate authentication, which requires an SSL connection and authenticates users by checking the SSL certificate they send. LDAP authentication, which relies on an LDAP authentication server. This is not supported for remote connections. Peer authentication, which relies on operating system facilities to identify the process at the other end of a local connection. (On local Unix-socket connections, this is treated as peer authentication.) Ident authentication, which relies on an “ Identification Protocol” ( RFC 1413) service on the client's machine. SSPI authentication, which uses a Windows-specific protocol similar to GSSAPI. Typically this is used to access an authentication server such as a Kerberos or Microsoft Active Directory server. GSSAPI authentication, which relies on a GSSAPI-compatible security library. Password authentication, which requires that users send a password. Trust authentication, which simply trusts that users are who they say they are.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |