Jump to content Japan - English

Software(Japanese)  >  Security(Japanese)

IceWall SSO

What is IceWall SSO? > What is IceWall SSO?
»

IceWall SSO

What Is IceWall SSO?
» What is Single Sign-On?
» What is IceWall SSO?
» Benefits
» Basic Features
Product Specifics
» Basic Architecture Diagram
» Operating Environment
» Reference Price
» Options
» FAQ
» Case Studies
» White papers
» Online Demo
» Support
» Implementation Services
» Contact Us
Related Products
» IceWall Federation
» IceWall Remote Configuration Manager

IceWall’s Office 365cloud Federation
(Last Update : 2012.4.26)

»What is Single Sign-On?

What is IceWall SSO?

»Benefits

»Basic Features

Basic Features

  IceWall SSO is a single sign-on product that provides the users with the ability to authenticate only once and then log into multiple Web applications while integrating the 4 A's (Authentication. Authorization, Administration, and Auditing) of access control.
Integrated access control management with IceWall SSO
Integrated access control management with IceWall SSO
- Integrated management of the 4 A's (Authentication. Authorization, Administration, and Auditing) of access control provides visibility into user behavior
- Dramatically improves productivity
   
Lack of Integration: Application based Control
Lack of Integration: Application based Control
- The traditional way of controlling access on an application by application basis lacks visibility into user behavior
- Requires high management costs
   

Basic Architecture

IceWall SSO is a Web single sign-on product primarily based on the reverse proxy method that delivers agentless single sign-on with minimal restrictions on the operating systems and Web applications.
(IceWall SSO provides support for the agent based method as well.For more information, please see "IceWall SSO Agent Option.")

Key Point 1: All transnactions pass through the IceWall server where they are checked for authentication and authorization. This provides the Web servers (applications) with defense against malicious attacks.
Key Point 2: You can use virtually any operating system and Web application since you do not have to install agent modules on the Web servers.
Key Point 3: You can maintain access log files for comparison of authentication and authorization information returned by the authentication server (authorization database) when requested by the IceWall server.
» Back to the top of this page
Printable version
Privacy statement Using this site means you accept its terms  
Please note: all of the links on this page navigate you to pages in Japanese.