Identity Access Control
SafeConnect’s Identity Access Control recognizes when unknown devices attempt access to your wired, wireless, or VPN networks and provides the following essential features and benefits:
- Agentless device identification and role profiling provides visibility into when a device is connected to the network, what type of device it is, and the identity of the user behind that device
- End User Authentication prevents unauthorized users from accessing network resources and participates in 802.1X/RADIUS and AD Domain Single Sign-On (SSO)
- Guest Self-Registration automates the process of provisioning temporary network access for your guests
- Device Enrollment allows end users to self-enroll IoT-enabled devices, printers, Smart TVs, or gaming systems based on their identity
- Real-time identity-to-device association and standards-based integration with third-party policy management systems
- Real-time Reporting Dashboard for data archiving and historical reporting
- Cloud-managed support updates for device type fingerprinting within 48 hours
- RADIUS and TACACS+ servers are included
Identify Key Contextual Intelligence Attributes
Identity Access Control provides in-depth visibility around all of the devices and users connecting to your network. Click on each item below to learn more:
User Identity
Know exactly who your users are:
- Full name
- User name
- Email address
- Workgroup
- Authentication/guest status
Device Type
Gain more understanding about the types of devices on your network, and create access policies based on things like:
- Device Type
- Domain Membership
- System Information
- MAC Address
- IP Address
- Connection type
Location
Know exactly where a user is located on your network with Location Awareness, down to the switch port, wireless controller or access point levels.
Ownership
Domain-managed device, guest, or BYOD? Create access level policies based on whether the device is corporately-issued, personally-owned or guest-only.
Time
Craft policies of access based on the time of day a user connects to your network; see logins, logoffs and authentication attempts by time.