Skip to main content

Use of Encryption

Hitachi ID Access Certifier uses encryption as follows:

  • Administrator credentials, with which Access Certifier connects to target systems to list users and ultimately to deactivate accounts and remove group memberships, are encrypted using AES.
  • Communication between the main Access Certifier server and Access Certifier proxy servers is via TCP/IP, protected using AES, encrypted using a shared key.
  • Communication between the main Access Certifier server and local agents on Unix and OS390/zOS target systems is via TCP/IP, protected using AES, encrypted using a shared key.
  • Communication between multiple Access Certifier servers, to replicate data and support high availability and load balancing, is protected using AES, encrypted using a shared key.
  • Communication between end users and product administrators and the Access Certifier web user interface is using HTTP over SSL (HTTPS).

Read More:

  • Multi-layered Security Architecture:
    Security is implemented as multiple layers, each of which acts to protect Access Certifier data and embedded privileges.
  • Use of Encryption:
    Use of Encryption to protect sensitive user data in storage and transit.
  • Web Form Input Protection:
    Inputs to web forms in Access Certifier are automatically protected against bogus data, buffer overruns and more.
page top page top