Tackle the Data, not the Application
How does Identiprise achieve its Span, Speed, and Scale?
Simply put, SecuredUser uses an "in-line" topology in which the SecuredUser elements sit between the user, the application, and the directory stores. Identiprise performs all of its work by transparently intercepting and transforming the data stream between these entities. Consequently, once deployed, neither the user nor the applications know that SecuredUser is acting as an intermediary and governor of identity and access events between them.
Thanks to this unique architectural approach, Identiprise achieves a level of deployment transparency that makes it the most effective solution for inserting identity, access, and audit management infrastructure within a complex IT environment.
SecuredUser consists of a number of elements, generally grouped into two types: server and agent.
The SecuredUser Policy Server is the heart of the solution. It can be deployed in a variety of topologies, to ensure optimum enterprise scalability and support for a broad range of IT platforms . The
Policy Server drives a common architectural construct for all of SecuredUser's identity life cycle management services.
SecuredUser offers a number of agents that enable the automation of application sign-on and credential expiration/refresh, as well as tight integration with existing authentication technologies.