Skip to main content

Hitachi ID Access Certifier Integrations

Hitachi ID Access Certifier has an open architecture and can be integrated with the full spectrum of existing IT infrastructure:

  • Extensive set of connectors

    Access Certifier has built-in support for many types of systems, directories and applications. It can also be readily integrated with custom and vertical market applications, with little or no custom programming.

    Built-in support for every relevant platform expedites deployment, as roll-out is not held up waiting for product enhancements or custom software development.

  • E-mail integration

    Over 300 events can trigger e-mails to users, administrators, the help desk and more. This includes invitations to enroll, to approve requests and "thank you" e-mails. The same events can also trigger automatic creation or tickets in a problem management system.

    E-mail integration is primarily used to invite users to act and notify users of events that pertain to their profile or their authority.

  • Help desk / incident management integration

    Every logged event can trigger "external systems notification." Binary integration programs are provided to propagate event data to any of over 20 types of help desk applications:

    Please refer to [link] for a list of supported/integrated incident management applications.

    Additionally, Access Certifier can integrate with various other incident management applications through an ODBC connection, by filling in web forms, by posting messages to web services or by sending messages to a incident management system's e-mail gateway.

    Separately, a request management management system may call into a Access Certifier web service to submit access requests, such as creating a new user, granting or revoking access, scheduling or triggering immediate deactivation, performing updates to attributes like name, location or department and much more. Access Certifier exposes an open, well documented SOAP/HTTPS web service for scenarios such as these.

  • Authentication tokens, smart cards, PKI

    Access Certifier can authenticate users (requester, authorizers, security administrators) using hardware tokens, smart cards or software PKI certificates. Access Certifier can also provision user objects and provision physical devices on these platforms.

Read More:

  • Architecture:
    Hitachi ID Suite network architecture.
  • Included Connectors:
    Systems on which Access Certifier can audit and reduce privileges.
  • Auto-Discovery System:
    How the Hitachi ID Access Certifier automatically discovers new, deleted and changed users and privileges on integrated systems and applications.
  • Other Integrations:
    Integrations between Hitachi ID Suite and other parts of an IT infrastructure.
  • Workflow:
    Workflow to prompt stakeholders to perform micro-audits, and to authorize access reductions.
  • RBAC:
    Relating Access Certification to role based access control.
  • Server Requirements:
    Sizing, configuration and number of servers on which to deploy Access Certifier
  • Language Support:
    Languages Supported by the Hitachi ID Identity and Access Management Suite
page top page top