cyberelements Access cyberelements Access The single authentication for business performance Get a demo cyberelements Access | A single vault for authentication to your desktops and application SSO from all user contexts cyberelements Access is an authenticationPrimary or secondary authentication Authentication allows a user to guarantee his or her identity before accessing a resource or service. Primary authentication will give user access to the workstation (Windows… More and access management (AM) solution. It reinforces access to the user’s desktop with a second authentication factor, and automatically manages access to all on-premise or cloud applications. The user’s application accounts are stored in a centralized secure vault, and an individual local vault for managing disconnected access. The solution also offers full traceability of user and administrator access. Customer stories cyberelements Access allowed us to carry out our project, to simplify access and define a more serious password policy to reinforce access security. The solution has also improved the work experience of users, who can no longer do without it. Loann FraillonDirector of Infrastructure Learn more about our customer stories Use cases Enhanced primary authenticationPrimary or secondary authentication Authentication allows a user to guarantee his or her identity before accessing a resource or service. Primary authentication will give user access to the workstation (Windows… MoreYou want to strengthen user authentication on the desktop by multiplying authentication factors.cyberelements Access offers you various multi-factor authentication modes (cards, OTP, biometrics, eCPS). It provides a centralized management interface for authentication media, and offers several enrolment modes for your authentication media. Regulatory complianceYou have to comply with regulatory obligations.cyberelements Access offers authenticationPrimary or secondary authentication Authentication allows a user to guarantee his or her identity before accessing a resource or service. Primary authentication will give user access to the workstation (Windows… More modes that enable you to comply with these regulations (legal, sector). Apply and enforce a general password policy You want the passwords set by your users to be strong and compliant with your security policy. cyberelements Access offers a module that forces the complexity of the Windows password when the user changes it, giving immediate visual indication of its compliance with your security policy. The solution also offers lifecycle management of all your users’ passwords. Simplifying authenticationPrimary or secondary authentication Authentication allows a user to guarantee his or her identity before accessing a resource or service. Primary authentication will give user access to the workstation (Windows… More providing users with greater comfort and securityYou want to secure access to your applications without this being seen as a constraint by your users.cyberelements Access lets you manage automatic connection to all your applications (thick client or web). Service continuity for users in connected or disconnected mode You want your mobile or working from home users to continue accessing their applications automatically.cyberelements Access offers a local cache with a configurable lifetime, enabling users to continue accessing their desktops or applications when disconnected from the corporate network. Easy and secure access to shared desktopsYou want to secure access to your shared desktops.cyberelements Access implements very quick authenticationPrimary or secondary authentication Authentication allows a user to guarantee his or her identity before accessing a resource or service. Primary authentication will give user access to the workstation (Windows… More and session unlocking mechanisms. In just a few seconds and a single action, the user authenticates himself with his card, unlocks his Windows session and launches one or more applications. Access trackingDo you need to know who accessed what, when and how? cyberelements Access offers auditing and reporting features that provide complete traceability of access by your users and solution administrators. Empowering users to manage their passwords and authenticationPrimary or secondary authentication Authentication allows a user to guarantee his or her identity before accessing a resource or service. Primary authentication will give user access to the workstation (Windows… More mediaYour IT team or help desk receive a large number of requests to reset user passwords.cyberelements Access offers self-service features enabling users to reset their password or unlock the access to their desktop. Get a demo Features Enhanced primary authentication Apply and enforce a general password policy Easy and secure access to shared desktops Enhanced primary authentication AuthenticationPrimary or secondary authentication Authentication allows a user to guarantee his or her identity before accessing a resource or service. Primary authentication will give user access to the workstation (Windows… More with a smart card: CPx, Ypsid IASECCContactless card authentication: Mifare Classic, Desfire EV1/EV2Authentication with e-CPS applicationAuthentication with one-time password (OTP) generated with mobile application or Radius-compatible deviceCentralized biometric authentication Apply and enforce a general password policy Password renewal frequency managementStrong password insuranceCompliance with password policiesPassword strength assessment (Password Force Index (PFI) function)Centralized management of password policies Easy and secure access to shared desktops Nominative user accountsSession tokenSeamless monitoringKiosk :Nominative application access, automatic session locking (inactivity counter)Login / logout rulesAutomatic launch/close of applicationsSession roaming in virtualized environmentsSwitch from a kiosk station to a sedentary station (nominative) Simplifying authentication with greater comfort and security Empowering users to manage their passwords and authentication media Service continuity in mobility situation Regulatory compliance and traceability Simplifying authentication with greater comfort and security Single sign-on authenticationPrimary or secondary authentication Authentication allows a user to guarantee his or her identity before accessing a resource or service. Primary authentication will give user access to the workstation (Windows… More (Windows login + seamless access to applications)“Tap-tap” mode: insert and remove the card, you’re authenticated; insert it again, you’re logged out.Password renewal management (domain and applications)Centralized vaulte-SSO for access to all types of applications (Windows, Web…)Shared accounts, multi-accounts, account delegation Empowering users to manage their passwords and authentication media Self-service :Password resetAccess to a desktop if you forget your card (or your second authenticationPrimary or secondary authentication Authentication allows a user to guarantee his or her identity before accessing a resource or service. Primary authentication will give user access to the workstation (Windows… More factor)Card unlockingMechanisms: Q&A, Challenge, OTP mail/sms/mobile appUser self-registration: card, application passwordAccounts delegation with validity period Service continuity in mobility situation Local connection cache with configurable lifetime for access in disconnected mode (eSSO, authenticationPrimary or secondary authentication Authentication allows a user to guarantee his or her identity before accessing a resource or service. Primary authentication will give user access to the workstation (Windows… More, self-service)Agent installed on managed desktops to ensure mobility with VPNVirtual Private Network. VPN is a technology that simulates a local area network between two trusted networks. In practice this allows two elements (workstations, servers, printers, etc.) to communicate with… More access Regulatory compliance and traceability Centralized and enhanced password policy managementNominative e-SSO accessRemoval of generic accounts and use of a nominative account for each userTraceability audits: who logged on to which desktop, how, to what and with which account?Answer to traceability of administrator actions: who did what?AuthenticationPrimary or secondary authentication Authentication allows a user to guarantee his or her identity before accessing a resource or service. Primary authentication will give user access to the workstation (Windows… More in healthcare sector via CPx / eCPS cards