描述
Identity and Access Management Solution
Solutions focused on unified identity, credentials and access management 
Major provider of world-class integrated information security solutions
描述
Digital identity:AccessMatrix introduction
DIGITAL IDENTITY:Platform introduction
Identity and Access Management, Versatile Authentication and SSO Platform
Universal identity management platform (UIM): automatically add, delete, modify and check user accounts, and realize full life cycle management for all types of user accounts
Universal authentication platform (UAS): realize two factor authentication and improve the login security of business system
Universal single sign on (USO): use AI password memory mode to log in to the business system uniformly without interface modification
Universal access management (UAM): use the interface transformation method to uniformly log in to the business system and improve the user experience
Universal voucher management (UCM): manage the IT infrastructure operation and maintenance account throughout its life cycle

描述
描述
Integrated Business Model
AccessMatrix™ ISA provides common security services to provide centeral management for all applications. It provide many ways to help customer to integrate various applications via one common security platform. It can simply operations , reduce the cost with best service.
Identitys Consolidation
         Identidy Life cycle management will create a master identity store via way of "dispersing to centralize" . It will unifies the user account and password info originally dispersed in each applications to the master store and will be managed centrally. It will provide user identity info for all application atuomatically. database for information systems. It will be an unified user identity standards for applications.
描述
描述
Solution Logical Platform
LOGICAL FRAMEWORK
Technical features of platform 
TECHNOLOGICAL CHARACTERISTICS
Unified identity management 
Multi user type management, business role-based authorization, workflow approval control, and multi-target system management 
Role Management
Flexible deployment 
Policy driven model of hierarchical partition and fine-grained authorization management
Support field deployment and cloud delivery
Hierarchical partition authorization
Patented layered partition security management means and authorization framework
Strong compatibility
Support the use of multiple scenarios and devices, and provide access to multiple networks, applications or access control and other physical equipment resources 
Mobile Security
Protect mobile device data, user authentication and application running environment
描述
描述
描述
描述
描述
描述
IDM Integrated Solution
IDM Integrated Solution
描述
Email:service@daoyatec.com 
Copyright © 2001-2021 Daoyatec All Rights Reserved.