Authentication

More than 30 IDM realisations in the Czech Republic and abroad

AMI Praha Authentication
Privileged Access Management

Privileged Access Management

Management and security of accounts with high level of permissions

Solving the question “Who guards (access to) the guard?”

Strong multi-factor authentication

Password lifecycle management

Logging activity in open sessions

SSO for access to systems

Together with IdM (authorization) forms a complete admin account management

Support for GDPR, ZoKB

Access Management

Access Management

Managing user access to information resources

Ability to use two or more factors to verify identity

MFA by location, time, non-standard frequency or combination of accesses, etc.

SSO – use of a single login (e.g. to AD/LDAP) for automatic login to other systems/applications

Together with IdM, they form IAM – complete access and permissions management to systems and applications in the organization

Support for GDPR, ZoKB

Multi-Factor Authentication

Multi-Factor Authentication

A method of authenticating a user to a system or service by multiple, independent factors

Multi-Factor Identity Authentication (MFA)

A method of authenticating a user to a system or service by multiple, independent factors

It generally consists of something the user knows (password, personal information), something the user possesses¬†(hardware token, mobile phone, ID card), and something that represents the user’s physical identity (fingerprint, retina scan, voice, DNA)

Customer Identity and Access Management

Customer Identity and Access Management

Identity management  of customers who need access to customer portals/information systems

Based on permissions, rights are automatically assigned to parts of systems, applications

CIAM systems typically provide a combination of features including authentication with dynamic assignment of authorization rules (PBAC/ABAC access) for customer registration, self-service account management, consent, and preference management, single sign-on (SSO), multi-factor authentication (MFA), access management, directory access definitions and data access control

Digital identity

Digital identity

New user onboarding and login based on third party trusted identity providers providing KYC data and user authentication to service providers as part of the federation of authentication principles.

Easy proof of identity online

Secure login to public and private sector services

Identity verification, contract signing and secure login without a password

Saving time and costs

Online verification of client (KYC, AML)