Identiprise Services Company Support Contact
  OUR PRODUCTS
   
  SecuredMobile
Security
Mobility
Manageability
Ease of Deployment
Architecture Overview
   
  SecuredUser
Features
Architecture Overview
FAQ
Enterprise Edition
Web Edition
   
 
  Your Location:   home    identiprise    architecture overview    Identiprise Home  
 

Tackle the Data, not the Application
How does Identiprise achieve its Span, Speed, and Scale?

Simply put, SecuredUser uses an "in-line" topology in which the SecuredUser elements sit between the user, the application, and the directory stores. Identiprise performs all of its work by transparently intercepting and transforming the data stream between these entities. Consequently, once deployed, neither the user nor the applications know that SecuredUser is acting as an intermediary and governor of identity and access events between them.

Thanks to this unique architectural approach, Identiprise achieves a level of deployment transparency that makes it the most effective solution for inserting identity, access, and audit management infrastructure within a complex IT environment.

Architectural Components
SecuredUser consists of a number of elements, generally grouped into two types: server and agent.

Server Elements
The SecuredUser Policy Server is the heart of the solution. It can be deployed in a variety of topologies, to ensure optimum enterprise scalability and support for a broad range of IT platforms . The Policy Server drives a common architectural construct for all of SecuredUser's identity life cycle management services.

 


 

Agents
SecuredUser offers a number of agents that enable the automation of application sign-on and credential expiration/refresh, as well as tight integration with existing authentication technologies.

 

 



   CONTACT US   |   PRIVACY   |   CUSTOMER SUPPORT