04.22.2010 - Optimal IDM Announces Support for Sharepoint 2010

Optimal IdM, LLC, a premier Microsoft ISV and Identity & Access (IDA) partner, today announced support for SharePoint 2010. Enabling Claims-based authorization through its Virtual Identity Server. The integration will be demonstrated at The Experts Conference April 25th-28th in Los Angeles, CA. ...

04.8.2010 - Optimal IDM Announces DSML Support for Its VIS

Optimal IdM, LLC, a premier Microsoft ISV and Identity & Access (IDA) partner, today announced the release of a Directory Service Markup Language (DSML) adapter for its Virtual Identity Server™ (VIS), the .NET Virtual Directory. DSML is a standards-based XML representation of directory access operations that are transmitted via Simple Object Access Protocol (SOAP). ...

Tags

  • The database in which all of your organization’s sensitive identity data is stored.
  • A digital ledger in which digital transactions are recorded chronologically and publicly.
  • Securely managing customer identity and profile data, and controlling customer access to applications and services.
  • The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
  • A legal framework that sets guidelines for the collection and processing of personal information of individuals within the EU.
  • The policy-based centralized orchestration of user identity management and access control.
  • An authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
  • A global provider of innovative and affordable identity access management solutions. 
  • Managing and auditing account and data access by privileged users.
  • Tools and technologies for controlling user access to critical information within an organization.
  • An authentication process that allows a user to access multiple applications with one set of login credentials.