Skip to main content

Hitachi ID Access Certifier Integrations

Hitachi ID Access Certifier has an open architecture and can be integrated with the full spectrum of existing IT infrastructure:

  • Broad Platform Support

    Access Certifier has built-in support for most common systems and applications. It can also be readily integrated with custom and vertical market applications, with little or no custom programming.

    Built-in support for every relevant platform expedites deployment, as roll-out is not held up waiting for product enhancements or custom software development.

  • E-Mail Integration

    Over 312 events can trigger e-mails to users, administrators, the help desk and more. This includes requests to register, requests for change authorization and "thank you" notes. The same events can also trigger automatic creation or tickets in a problem management system.

    E-mail integration is primarily used to invite users to act and notify users of events that pertain to their profile or their authority.

  • Help desk / incident management integration

    Every logged event can trigger "external systems notification." Binary integration programs are provided to propagate event data to any of over 20 types of help desk applications:

    Please refer to [link] for a list of supported/integrated incident management applications.

    Additionally, Access Certifier can integrate with various other incident management applications through an ODBC connection, by filling in web forms, by posting messages to web services or by sending messages to a incident management system's e-mail gateway.

    Separately, an incident management system may call into a Access Certifier web service to submit requests, such as creating a new user, granting or revoking access, scheduling or triggering immediate deactivation, performing updates to attributes like name, location or department and much more. Access Certifier exposes an open, well documented SOAP/HTTPS web service for scenarios such as these.

  • Authentication tokens, smart cards, PKI

    Access Certifier can authenticate users (requester, authorizers, security administrators) using hardware tokens, smart cards or software PKI certificates. Access Certifier can also provision user objects and provision physical devices on these platforms.

page top page top