One key to open many doors.
The solution Uniquid provides unique and secure access to several heterogeneous web services in a federated way.
How does it work?
- The user accesses to the application and clicks on the unified authentication icon.
- The application redirects the user to the Identitiy Provider (IdP) and shows the authentication screen.*
- The user gives her credentials.
- The identity provider authenticates the user, makes an “Assertion of Identity” and sends it to the application.
- The application interprets the assertion and authorizes access to the user.
(*) The SSO system allows these steps to be neccesary only the first time
- Single Sign-On (SSO) web
- Better Identity Management
- Unified Authentication
- User Friendly
- Easy administration
- Flexible and adaptable
Real SSO that works among different domains and even different organizations
Login once and access every system
Connectors available for several applications
Several platforms and application in the cloud already federated will increase instantaneously your visibility.
Single Log Out process
One user will be able to finish the session from all the services with just one click improving the security of all his accounts.
Identity data aggregation from heterogeneous and distributed sources
Consolidation of identity filters attributes
Uniquid unifies spread identities. Once the user is authenticated, it is possible to use extra internal or external sources to enrich the identity of the user.
It is possible to set filters that transforms attributes or even generate new ones.
User data is transferred from the Identity provider to the service provider creating/updating user accounts in different applications automatically
No more painful user migrations
Wrapping of external authentication sources
Multiple sources of authentication
It does not care about your users being in SQL, OpenId, LDAP/ActiveDirectory, x509 certificates (DNIe), text files, social networks, Google apps...
Uniquid can be adapted to your infrastructure
Customizable Authentication cache
You decide how long sessions last and where they are stored
It gives maximum privacy to the user fulfilling the laws for personal data protection
It is optional and could be used to inform the user that some of her personal data may be transferred to the chosen service upon her approval
The user is in control.
Different data disclosure policies for different services
Each service retrieves just the information it needs
This guarantees user privacy
Easy to maintain. Administration tasks become smoother
Automatic processes and customizable alerts
Metadata is updated and validate automatically. It can alert the administrator about the expiration of metadata or digital certificates.
Administrators can sleep knowing that Uniquid is taking care of their systems
User access statistics available through the web
It is possible to find out the number of authentication requests made per service, as well as the evolution in time of those requests.
It is possible to know at any given time if your systems are being used
Flexibility and adaptation
Flexibility to set the ubication of the identity provider service
It is possible to ubicate as an indepent node or embedded in the service itself.
Support for multiple protocols
It supports the standards SAML 2.0, SAML 1.0, Shibboleth 1.3 and OpenID
Deployment in high availability mode
Thanks to the possibility of integration with Memcached
Solution based in open source
Uniquid collaborates with open source projects by contributing in their development