Zero Password for Signing On to Applications

By November 24, 2017 No Comments

Accessing all enterprise assets and applications without a password? It is possible.

IDaaS Next offers zero password access to all enterprise assets and applications without any code changes on the target applications and yet create individual user sessions for each application access.

Let’s see how it is possible without compromising the security:

There are multiple scenarios where users need to user their passwords to get access to their assets & applications:

  1. Accessing Laptop/Desktop/Mobile
  2. Accessing various applications
  3. Changing the passwords on a regular interval

Now we see, how users can eliminate their passwords completely with the help of IDaaS Next solution:

Request a Demo

As a first step, users can access their domain-joined machines by swiping their fingers and get authenticated against AD. Once they authenticate with AD successfully, the IDaaS Next App Launcher Utility (ALU) gets invoked automatically and users are able to view the ALU launchpad with the applications that they can access, on their laptop/desktop. ALU leverages features “Integrated Windows Authentication” (IWA) feature to create the IDaaS Next session for the user who logged in to that machine with domain credentials.

Users can now access any of their authorized applications by just clicking on the application icon on the ALU launchpad. ALU launches the applications with the user’s session. ILANTUS can classify the applications that can be integrated with IDaaS Next in to any of the following three categories:

  1. Applications that support federation protocols
  2. Application that supports Web Authentication Security
  3. Thick-Client Applications

Thus users can access their assets and application without any passwords: yea, really Zero Password.

But this is not the end! IDaaS Next also offers automatic password changes. With this feature, IDaaS Next will generate random password (as per the enterprise password policies) for a user and changes his/her AD credential password and synchronize the same password to all other target applications that this user is authorized to access. With this, the user’s passwords for all assets and applications are getting changed on regular intervals thus ensuring the security. User can access the applications without keying in of any password.

IAM Expert

Author IAM Expert

More posts by IAM Expert

Leave a Reply