By implementing an identity management system, you've taken a major step toward automating user provisioning. However, for effective security, you also need granular access management, especially for privileged users who require root and other functional accounts to administer servers, applications and databases. By combining identity and access management, you will be able to automatically enforce authorization and authentication and even control what commands the administrator can execute without sharing privileged passwords. As well, when you remove a user from your IDM system, their user accounts will be automatically removed from across all of your Windows, Unix, Linux, and virtual servers to significantly reduce the risk of a data breach.
FoxT ServerControl provides a seamless way to add fine-grained access controls and privileged access management to your identity management processes. It also lets you proactively enforce both contextual authentication and granular authorization policies to strengthen security. If you are using Oracle Identity Manager, FoxT has a validated connector, the Oracle Identity Manager Interface that makes it very easy to add and synchronize robust access control enforcement with your identity management processes. For other IDM solutions, you can use the FoxT Web Services Interface to create the connection between your IDM system and FoxT's privileged access management capabilities. Using either of these approaches you can:
You are using an outdated browser. Sorry, this web site doesn't support Internet Explorer 6. To get the best possible experience using our website we recommend that you upgrade to a newer version or other web browser. A list of the most popular web browsers can be found below. It is completely free for download: