Skip to main content

Frequently Asked Questions for Prospective Customers

Who is Hitachi ID Systems?

Hitachi ID Systems, Inc. delivers access governance and identity administration solutions to organizations globally, including many of the Fortune 500 companies. The Hitachi ID Identity and Access Management Suite is a fully integrated solution for managing identities, security entitlements and credentials, for both business users and shared/privileged accounts, on-premise and in the cloud.

The Hitachi ID Identity and Access Management Suite is well known in the marketplace for high scalability, fault tolerance, a pragmatic design and low total cost of ownership (TCO). Hitachi ID Systems is recognized by customers and analysts for industry leading customer service.

Originally founded in 1992 as M-Tech Information Technology, Inc. and acquired by Hitachi, Ltd. in 2008, Hitachi ID Systems, Inc. is a leading provider of identity management and access governance solutions.

Hitachi ID Systems first identity management and access governance product, Hitachi ID Password Manager, has been commercially available since 1995. Today, Hitachi ID Systems is the leading password management vendor world-wide and a leading provider of identity and privileged access management solutions.

Hitachi ID Systems currently has 160 employees. Hitachi ID Systems has enjoyed strong financial performance, with 76 consecutive quarters of growth and profitability.

Hitachi ID Systems is headquartered in Calgary, Canada and has regional offices in: Canada: Vancouver, Montréal and Ottawa; United States: New York. Europe: Amsterdam, Leeds UK and Warsaw, Poland. Australia: Brisbane.

What is Password Manager?

Password Manager is an integrated solution for managing user credentials, across multiple systems and applications. Organizations depend on Password Manager to simplify the management of those credentials for users, to reduce IT support cost and to improve the security of login processes.

Password Manager includes password synchronization, self-service password reset, enterprise single sign-on, PIN resets for tokens and smart cards, enrollment of security questions and biometrics and emergency recovery of full disk encryption keys.

Password Manager reduces the cost of password management using:

  • Password synchronization, which reduces the incidence of password problems for users
  • Self-service password reset, which empowers users to resolve their own problems rather than calling the help desk
  • Streamlined help desk password reset, to expedite resolution of password problem calls

Password Manager strengthens security by providing:

  • A powerful password policy engine.
  • Effective user authentication, especially prior to password resets.
  • Password synchronization, to help eliminate written-down passwords.
  • Delegated password reset privileges for help desk staff.
  • Accountability for all password changes.
  • Encryption of all transmitted passwords.

To find out more about Password Manager, visit

What does Hitachi ID Identity Manager do, and how does it relate to Password Manager?

Identity Manager is a separate product built on the same infrastructure as Password Manager. Where Password Manager manages passwords, Identity Manager creates, deletes and manipulates user accounts.

Identity Manager is an integrated solution for managing identities and security entitlements across multiple systems and applications. Organizations depend on Identity Manager to ensure that users get security entitlements quickly, are always assigned entitlements appropriate to their needs and in compliance with policy and are deactivated reliably and completely when they leave the organization.

Identity Manager implements the following business processes to drive changes to users and entitlements on systems and applications:

  • Automation: grant or revoke access based on data feeds.
  • Synchronization: keep identity attributes consistent across applications.
  • Self-service: empower users to update their own profiles.
  • Delegated administration: allow business stake-holders to request changes directly.
  • Certification: invite managers and application owners to review and correct entitlements.
  • Workflow: invite business stake-holders to approve or deny requested changes.

Identity Manager strengthens security by:

  • Quickly and reliably removing access to all systems and applications when users leave an organization.
  • Finding and helping to clean up orphan and dormant accounts.
  • Assigning standardized access rights, using roles and rules, to new and transitioned users.
  • Enforcing policy regarding segregation of duties and identifying users who are already in violation.
  • Ensuring that changes to user entitlements are always authorized before they are completed.
  • Asking business stake-holders to periodically review user entitlements and either certify or remove them, as appropriate.
  • Reducing the number and scope of administrator-level accounts needed to manage user access to systems and applications.
  • Providing readily accessible audit data regarding current and historical security entitlements, including who requested and approved every change.

Identity Manager reduces the cost of managing users and security entitlements:

  • Auto-provisioning and auto-deactivation leverage data feeds from HR systems to eliminate routine, manual user setup and tear-down.
  • Self-service eliminates IT involvement in simple updates to user names, phone numbers and addresses.
  • Delegated administration moves the responsibility for requesting and approving common changes, such as for new application or folder access, to business users.
  • Identity synchronization means that corrections to user information can be made just once, on an authoritative system and are then automatically copied to other applications.
  • Built-in reports make it easier to answer audit questions, such as "who had access to this system on this date?" or "who authorized this user to have this entitlement?"

How does Password Manager reduce help desk costs?

Password Manager realizes cost savings and enhanced productivity for both users and the IT support organization:

  • User productivity: Users experience fewer password problems.

    This is a result of password synchronization, which helps users to remember one or two passwords, rather than forgetting or writing down many different passwords.

  • Fewer IT support calls: Login problems are resolved by users, without calls to the help desk.

    Users can reset forgotten passwords, clear intruder lockouts, recover hard disk encryption keys and reset PINs on their smart cards and tokens -- all via self-service.

  • Reduced cost per support incident: Calls that still reach the help desk are resolved more quickly.

    Remaining login-related support calls are resolved with a streamlined Password Manager process, which includes support analyst authentication, caller authentication, problem resolution and which automatically submits a ticket to the help desk incident management system.

How does Password Manager improve user service?

Password Manager improves user service by simplifying system and application login processes for users:

  • Users only have to remember one or two passwords.

  • All passwords are managed through a single, friendly interface.

  • Password policy is the same everywhere and is clearly defined.

  • Application login prompts can be automatically filled in using Hitachi ID Login Manager.

  • In the event of a password or login problem, users can quickly resolve their own problem, rather than calling the help desk and waiting for service.

  • Password expiration notices are delivered to all users, including mobile users with cached credentials, who currently do not receive them.

How does Password Manager improve security?

Password Manager improves the security of authentication processes:

  • A strong, uniform password policy prevents the use of easily guessed passwords and ensures that all passwords are changed regularly.
  • Password synchronization discourages written passwords ("sticky notes").
  • Consistent, reliable authentication processes ensures that users are reliably identified before accessing sensitive services, such as a help desk password reset.
  • IT support staff can be empowered to assist callers without having administrator accounts on every system and application.
  • Extensive audit logs create accountability for password resets.
  • Encryption ensures that passwords are not stored or transmitted in plaintext.

How does Password Manager compare to single sign-on?

Password Manager is not a single sign-on system. Rather, it manages and reduces the number of passwords that users must remember, but does not eliminate the need for users to type their own passwords.

Password management, rather than single sign-on, may be attractive, because of some problems with enterprise single sign-on software:

Previous approaches to enterprise single sign-on systems had problems, all related to the password database where application login IDs and passwords are kept:

  • Remote Access and Mobile Devices:

    Over time, a traditional E-SSO system will respond to applications expiring passwords by choosing new, random password values, allowing the application to change passwords and storing the random password value for future reference.

    With this process in place, over time users lose knowledge of their own passwords and become dependent on the E-SSO system to sign into their applications. This means that users cannot access their applications from devices that are not equipped with the E-SSO software, such as smart phones or even their home PCs.

  • Cost to Deploy:

    Building and maintaining a database of every login ID and every password on every application can be both costly and time consuming.

  • Cost to Reset Passwords:

    Login IDs and passwords stored in a traditional E-SSO system are typically encrypted using a key derived from the user's primary network password. When users forget their primary password, they lose this key and can no longer decrypt their application passwords. As a result, password problems may be less frequent with E-SSO, but resolving them is more complicated, time consuming and expensive.

  • Security and Availability:

    In the event that the password database in a traditional E-SSO system is compromised, every user ID and every password would be exposed.

    If the password database suffers an outage, every user would be locked out of every application.

It should be noted that Web single sign-on software (WebSSO) are less ambitious than enterprise SSO, but have none of its drawbacks. When users first access an Intranet page, they are diverted to an authentication page. Thereafter, whenever they access another page, their browser sends an encrypted authentication cookie to the web server, which validates it and does not prompt for a second login screen.

With agent-based WebSSO, there is no client software, no credential database and no costly password reset processes.

Password Manager can synchronize passwords across both legacy systems (network operating systems, applications, mainframes, etc.) and WebSSO systems, which typically authenticate users with an LDAP directory and password.

Is there an ROI model for Password Manager deployments?

There is a detailed ROI model for Hitachi ID Systems identity management and access governance solutions at:

ROI from Password Manager is principally due to improved user productivity (fewer password problems) and reduced workload for the help desk.

How does Password Manager compare to products from other vendors?

Password Manager is key element in an organization's identity management and access governance infrastructure. Other components may include user provisioning automation, such as Identity Manager, directories, meta directories, web single sign-on (WSSO) and web access management (WAM) products.

Password Manager may be compared to other identity management and access governance products as follows:

  • Core technology found only in Password Manager

    Password Manager is built for rapid deployment. Rapid deployment is accomplished with some key technologies that are not available in any other product, including:

    Password Manager is designed for rapid deployment:

    • No client software required, even for access to self-service password reset from the PC login prompt, if users are on-premise.

    • Automated discovery of every login ID on every target system, nightly.

    • Self-service login ID reconciliation where login IDs on different systems are different and there is no pre-existing correlation data.

    • A built-in identity cache that captures user profile data and eliminates the need to install or manage a database or directory before installing Password Manager.

    • Connectors for every common system and application eliminating the need for customers to develop their own connectors to common, off-the-shelf target systems.

    • Remote connectors mean that Password Manager can manage users and passwords on systems without requiring the installation of intrusive local software on each target system.

    • Flexible connectors enable organizations to integrate Password Manager with custom applications, vertical market software, application service providers (ASPs) and service bureaus quickly -- taking just 2 hours to 4 days per new target system.

  • Password reset products

    Some password management products focus solely on password reset.

    Password Manager's advantage over such products is a fundamentally different strategy. With Password Manager, customers first seek to eliminate problems, through password synchronization. Self-service is used to divert remaining problems, rather than as a primary tool for call volume management.

    This approach generates better returns, through higher user adoption rates and better user service. Typically synchronization, self-service and assisted password resets together reduce help desk password problem load by 95%, as compared to about 60% for just self-service password reset.

    Password Manager is also less expensive to purchase and deploy than products that offer just self-service password reset.

  • Password synchronization products

    Products that offer just password synchronization typically require agents to be installed on every target system. This triggers extensive change control and delays project roll-out.

    Most products that focus on password synchronization require either a mainframe or large Unix server. This makes deployment more costly.

    Synchronization-only products do not yield full value. Typically about 80% of password problems are eliminated by synchronization. Including self-service password reset improves the product's impact on the service desk to 90% or better.

    Password Manager is also less expensive to purchase and deploy than products that offer just password synchronization.

  • User provisioning products

    Products designed primarily to provision and manage systems access typically include a light-weight password management capability. This most often consists of two web-based screens:

    • Enrollment: users authenticate with an LDAP password and store one or two question/answer pairs for future reference.

    • Password reset: users authenticate with their LDAP password or by answering security questions and can reset their LDAP password or passwords on select other systems.

    This capability is much simpler than Password Manager:

    • Non-password authentication depends on trivial data and is consequently insecure.

    • There is no password synchronization capability.

    • There is no access to self-service from a PC login screen or a telephone.

    • There is no integration with incident management systems.

    • Only very few passwords can be managed.

    • User ID reconciliation is a complex and costly process.

    This capability does not meet the requirements of many enterprises, and organizations who install such user provisioning systems are well served by also deploying Password Manager.

  • WAM / WSSO products

    The password management capability in WAM / WSSO products is similar to that in user provisioning products, except that it is normally only possible to manage a single LDAP password.

    There is little real functional overlap between Password Manager and WAM / WSSO products.

What platforms does Password Manager support?




Any LDAP, AD, NDS, eDirectory, NIS/NIS+.

Windows 2000--2012, Samba, NDS, SharePoint.

Oracle, Sybase, SQL Server, DB2/UDB, ODBC, Informix, Progress.




Linux, Solaris, AIX, HPUX, 24 more variants.

z/OS with RAC/F, ACF/2 or TopSecret.

iSeries (OS400), OpenVMS.



Tokens, Smart Cards:

JDE, Oracle eBiz, PeopleSoft, SAP R/3, SAP ECC 6, Siebel, Business Objects.

Lotus Notes, Exchange, BlackBerry ES.

RSA SecurID, SafeWord, RADIUS, ActivIdentity, Schlumberger.


Help Desk:

HDD Encryption:

CA SiteMinder, IBM TAM, Oracle AM, RSA Access Manager.

BMC Remedy, BMC SDE, ServiceNow, HP Service Manager, CA Unicenter, Assyst, HEAT, Altiris, Clarify, Track-It!, RSA Envision, MS SCS Manager.

McAfee, CheckPoint (PointSec), Microsoft (BitLocker), Symantec (PGP), Sophos SafeGuard (Sophos).



Extensible:, WebEx, Google Apps, MS Office 365, Concur, AWS, vCloud, SOAP (generic).

OLAP, Hyperion, iLearn, Caché, Success Factors, VMware vSphere. Cisco IOS, Juniper JUNOS, F5, iLO cards, DRAC cards, RSA cards, etc.

SSH, Telnet, TN3270, HTTP(S), SQL, LDAP, command-line.


How is Password Manager licensed?

Password Manager pricing is based on the number of users (people, not login accounts). This includes all features, all connectors, all client software components and the right to run as many servers and CPUs as desired. A one-time purchase grants customers the perpetual right to use Password Manager.

Password Manager pricing is calculated using a smooth curve -- as the number of users increases, the price per user steadily decreases. This means that customers do not have to base their purchase volumes on price bands or tiers. Instead, customers purchase for the number of users actually required, knowing they will get the best price for that volume.

Customers are encouraged to, over time, extend their deployment of Password Manager to manage new target systems and to activate new features, at no additional charge.

Customers may run as many Password Manager servers as required, to provide high availability, redundancy and a test/QA environment, at no additional charge.

How long does it take to deploy Password Manager?

A basic Password Manager deployment typically requires from 10 to 40 days of work to design and implement.

At the larger end of the above spectrum are more complex implementations that include integrations with full disk encryption software, telephony infrastructure, VPNs (for self-service by off-site users), access from mobile phones and many password systems.

Once the software is active, user enrollment is often required. User enrollment is an ongoing process, as new staff are hired. In most cases, all users can be invited to enroll and most can be expected to complete registration, within 2-3 months of initial deployment.

How much work is needed to manage Password Manager in production?

Password Manager does not require active ongoing administration of user profiles and system functionality. Users are automatically detected on target systems, enrolled and invited to register if additional information is required.

A Password Manager administrator is required to monitor the servers, promote consistent password management to application owners, answer questions from the user community and perform periodic software upgrades.

These responsibilities typically amount to approximately 0.25 FTE.

page top page top