Identity Access Control

SafeConnect’s Identity Access Control recognizes when unknown devices attempt access to your wired, wireless, or VPN networks and provides the following essential features and benefits:

  • Agentless device identification and role profiling provides visibility into when a device is connected to the network, what type of device it is, and the identity of the user behind that device
  • End User Authentication prevents unauthorized users from accessing network resources and participates in 802.1X/RADIUS and AD Domain Single Sign-On (SSO)
  • Guest Self-Registration automates the process of provisioning temporary network access for your guests
  • Device Enrollment allows end users to self-enroll IoT-enabled devices, printers, Smart TVs, or gaming systems based on their identity
  • Real-time identity-to-device association and standards-based integration with third-party policy management systems
  • Real-time Reporting Dashboard for data archiving and historical reporting
  • Cloud-managed support updates for device type fingerprinting within 48 hours
  • RADIUS and TACACS+ servers are included

Identify Key Contextual Intelligence Attributes

Identity Access Control provides in-depth visibility around all of the devices and users connecting to your network. Click on each item below to learn more:

User Identity

Know exactly who your users are:

  • Full name
  • User name
  • Email address
  • Workgroup
  • Authentication/guest status

Device Type

Gain more understanding about the types of devices on your network, and create access policies based on things like:

  • Device Type
  • Domain Membership
  • System Information
  • MAC Address
  • IP Address
  • Connection type

Location

Know exactly where a user is located on your network with Location Awareness, down to the switch port, wireless controller or access point levels.

Ownership

Domain-managed device, guest, or BYOD? Create access level policies based on whether the device is corporately-issued, personally-owned or guest-only.

Time

Craft policies of access based on the time of day a user connects to your network; see logins, logoffs and authentication attempts by time.

Learn More About Identity Access Control
Guest Self-Registration Demo