USER DATA BETWEEN SYSTEMS
SINGLE SIGN ON
USER DATA BETWEEN SYSTEMS
Organizations have access to electronic systems that require registration and contain user information. This information includes, for example, personal and organizational information, as well as login information. The manual management of these information’s takes time and concentration from both the user and the maintenance.
Different usernames of the systems can also be in various forms, such as an email address, a PIN code or a user ID. Remembering and managing these usernames is time consuming as well as error prone. When a user’s information, like a title, a job description, unit or a name changes, user’s data may not update to all of the systems. When a person leaves the organization, their information can be forgotten to different systems as a result of human error.
The core features of our IDM product include real-time data transfer between systems. This allows a consistent username and keeps the user’s information up to date. When the user’s information changes, the electronic systems connected to the user are updated. In the addition of a new employee or a student, the information is transmitted to the person’s electronic services and when this person leaves the organization, their information is deleted from these services. Our IDM products reduce manual work, increase security and save users and IT-support’s time.
Numerous passwords for different systems are difficult to remember. This often forces us to write them down less securely for example on a paper, a mobile phone or on the memory of a web browser. Passwords can also expire at different times and changing them can be difficult and insecure.
The core features of our IDM product include real-time password synchronization, which eliminates the password problems. The password you choose stays up-to-date everywhere, so you can focus on using a single, stronger and more secure password.
If the password expires or is lost, the user may need to contact IT support to obtain a new password. On several different systems, passwords may expire at different times and password requirements may vary between systems. Problems can also occur outside IT support work hours or during the holiday season.
Our IAM product offers a password exchange service centrally in one base, around the clock. Our product allows the user to change their password, for example, with a bank ID or a mobile application, instantly without any further action.
Manually maintaining usernames on different systems requires time and care to avoid mistakes. You may have to search information on more than one system and it is troublesome to track changes and faults.
Our IAM solution provides a centralized view of user data and enables user changes, support actions, reporting and browsing of historical data. In this way, for example, the user’s problem situations are resolved through a single view, and even a mistaken change of name data can be easily traced and corrected in the personal register.
SINGLE SIGN ON
Using your organization’s electronic services may require several different logins to different services throughout the day. This takes time and concentration.
Our IAM solution offers single-sign on, which allows one-click login to desired systems, both within the organization and between collaborative organizations. Login is performed on a familiar and secure organization login page for all services. With this login, the user can access all electronic services without multiple logins.
Pegasi IAM Identity and Access Management ensures up-to-date and secure identity and identity information.Details ›
Pegasi Lynx is a user management and self-service tool that provides a single interface for all user maintenance.Details ›
Pegasi Delta is a user management and self-service tool designed for college environments.Details ›
Pegasi View reporting provides hands-on views and historical information about the status of users and identity management.Details ›
Pegasi SSO single sign-on allows you to log in to multiple systems with a single authentication.Details ›
Here you will find our technical notes about different topics. We do a lot of things, with wide range of technical solutions. Sometimes we write them down and share them with the world.
Below is the raw text between the keyboard and the monitor.
Clustered Shibboleth IDPStep by step guide on how to install clustered / HA Shibboleth IDP to your federation using two nodes and Postgres replication.
Enterprice Grade Clustered ZFS / NVME storage serverHow to set up a 2 node NVMe, high performance clustered Linux ZFS fileserver for production use utilizing RDMA and NVME-of.
Rescue broken Windows without image backupRescue / repair your windows installation when you do not have a backup image available. A very simple procedure with command line commands.
We’ve been around for a while. We were doing identity management before IDM was IDM, since 1995. We have seen and created several environments and have accumulated in-depth knowledge of most the technologies around IDM.
At Pegasi we believe not only in an uncompromising handprint, but also in in respecting and appreciating others around us. We believe that everyone deserves to find their own place and do things they like, in their own way. This is reflected in our work, motivation and attitude. We are a dynamic team of experienced industry veterans from a wide variety of backgrounds. We love to do identity management and we enjoy working with customers and partners.
- Teollisuuskatu 9, Lappeenranta, Finland
- 2 Bloor Street West, Suite 2120, Toronto, ON, Canada
- +358 40 5007099 | +358 40 5336498