Access control and single sign-on access to intranet and cloud-based applications and services


Easy SSO to cloud services

CloudAccess uses various technologies to provide single sign-on (SSO) to virtually any cloud-based service. With SSO, you can give users quick, convenient access to your cloud apps while increasing the security of your overall environment. For environments that support federation, CloudAccess is able to integrate with them out of the box, which includes a catalog of ever growing preconfigured connectors. For other services that don’t provide any type of SSO support, CloudAccess supplies a SSO add-on. Read more ›

Let User Authenticate with their Social Identity

Because CloudAccess comes with a library of preconfigured connectors for the most commonly used social identities, it’s easy for you to let users authenticate with their ID of choice. So if your organization finds value in being able about to consume social identities, you will be interested to know that CloudAccess supports many of them out-of-the-box. While most businesses and organizations only want to allow the most common social identity sources (Facebook, Twitter, Yahoo!, etc.), some organizations want to offer a broader set of options. Or perhaps, a specialized identity source such as a club, user group, or community. CloudAccess makes it easy for you to do it all. It comes integrated with the most common social identity sources right out-of-the-box, as well as support for any SAML 2 or OpenID Connect compatible sources.

Full user provisioning/de-provisioning

CloudAccess does more than just create an account. It provisions and onboards new user accounts with correct access and attributes automatically. This allows SaaS capabilities to be mapped to your existing user roles and groups. When the user changes roles or leaves the organization, the SaaS accounts automatically change with it. This helps you enable each user account and provide only the functionality each user needs, saving money and increasing security.

Simplified single sign-on access to Microsoft Office 365

Since CloudAccess provides single sign-on as well as robust provisioning for your Office 356 environment, you won’t have to hassle with Active Directory Federation Services (ADFS). And because it self-configures, the Office 365 connector is so much easier to deploy and administer than ADFS. In addition, CloudAccess does more than provide SSO to Azure AD environments, it automates the provisioning of user accounts complete with granular access controls to the proper applications. Read more ›

Secure mobile access for BYOD users

CloudAccess integrates with iOS and Android devices for simple and secure access. With CloudAccess, you can deliver your mobile applications, specify those who need access to them, and customize their behavior based on the user's role. Read more ›

Advanced authentication

CloudAccess comes with basic One-Time Password (OTP) built-in, giving you the option to provide an added level of protection to your users. You can enable OTP validation service for one or more applications.

OTP options include OATH OTP, smartphones, SMS and even a voice call. For environments that need more robust options, CloudAccess integrates with NetIQ Advanced Authentication allowing organizations full flexibility to use the method or appliance of their choice. Advanced Authentication.

Virtual appliance

CloudAccess packs all the right functionality as a virtual appliance that is easy to configure and maintain. Because it self-configures, CloudAccess installs in hours. And because it's fully locked-down, it's secure. CloudAccess is integrated with Downloads so you’ll receive automatically installed updates and enhancements once you approve them.

Access compliance reports

If your organization works with private or regulated information, it's essential that you be able to track and audit access information. CloudAccess features predefined activity reports that provide historical tracking of who has accessed specific SaaS-based applications and related information. Such reports are required to maintain a secure environment. You can also use them to identify users who are not utilizing their paid SaaS accounts.