IBM Security Verify Governance
IBM Security Verify Governance help organizations to automate digital identity and access management, and ensure the right people get the right access to the right resources at the right time, and for the right reasons.
ExploreProduct Description
Overview
IBM Security Verify Governance is based on mature product for Identity Governance and Administration (IGA) solutions that are focused on automation of identity lifecycle management with the flexible provisioning policies and workflows to support identity joiner, mover and leaver change control processes with comprehensive auditing. It supports integration with wide range of platforms and applications running on premises and in the cloud.
Key features include:
User Onboarding and identity synchronization for different types of users
Account provisioning and fine-grained entitlement management.
Business user friendly service portal for access request, access certification and password management for self-service and to manage other users.
Flexible account provisioning policy and no code/low code workflow for access request approval and account fulfilment.
Rich set of REST APIs to enable integration with IT service management tools (ITSM) and home-grown custom service portal applications.
Separation of Duty risk control for roles
Integration with 3rd party Identity Provider to support single sign-on, multi-factor authentication, adaptive access control, and privileged access management.
Developer toolkit to support integration with platforms and applications in hybrid environment.
Highlights
Modernized architecture to run on Kubernetes container platform - runs on WebSphere Liberty application server, a lightweight Java runtime compatible with latest Java platform, automated installation, and configuration to provide better time-to-value for deployment and maintenance with improved monitoring, performance, and scalability.
Intuitive Interface for Access Certification - enables you to run access certification campaigns to reconfirm users access needs efficiently. This release introduces a web user interface for access certification with optimized usability, providing a simple and intuitive user experience.
Enhanced Access Request Workflow - includes identity lifecycle and entitlement management, attribute and role-based access control policies, flexible access request workflows with point-and-click configuration, and a rich set of adapters for both on-premises, as well as for the cloud applications to automate entitlement discovery and provisioning of user access to applications and data.