You can use file access management to create a secure intranet. What you're looking for is a Web access management...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
(WAM) product; you can find these products through any of the large identity management vendors.
Web access management systems are designed to provide users with secure access to applications through the Web. To do this, they use directory services for profile and policy storage and administrative interfaces for policies; they also use policy decision points , and agent-based and proxy-based policy enforcement points. Access can be managed directly on the WAM, or it can be integrated into the front-end of a portal implementation. WAMs also let organizations federate domains using the Simple Object Access Protocol (SOAP), which enables users to access resources across domains with a single login (users such as an external vendor who manages an organization's employee benefits).
But be aware, though you didn't mention non-Web-based applications, WAMs do not control access to applications that use proprietary protocols. Other technologies such as provisioning systems and single sign-on (SSO) products are required to secure those environments.
For more information:
Related Q&A from Randall Gamby
Enterprise SSO products have matured over the years, so what's the state of eSSO today? Expert Randall Gamby discusses.continue reading
Enterprises need a full understanding of the FIDO authentication framework before switching to its technology. Expert Randall Gamby looks at the most...continue reading
A self-managed HSM appliance may be the safer external key management system to use with your organization's encryption keys. Here's why.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.