Hitachi ID Systems, a provider of identity and access management (IdM) systems, has introduced version 6.1 of its identity management suite.
The company said that new release builds on the architecture first introduced in Hitachi ID Management Suite 6.0 and adds new features such as a new RBAC enforcement engine. When role definitions are changed, this engine automatically adds and removes entitlements to and from users. Also, if administrators change user entitlements out of band, the enforcement engine brings users back into compliance.
A new subsystem allows systems of record to trigger automatic provisioning, deactivation and synchronisation actions in real time. The company added that Pre-defined requests allow administrators to create simple forms for popular requests, such as ‘Hire a contractor’ or ‘Schedule termination’. Users can then submit change requests without having to navigate through all of a recipient’s identity and access information.
According to the Hitachi ID, the new version also supports automated, manual and mixed-mode integrations. This allows organisations to deploy Hitachi ID Identity Manager as the single place where users request access changes, regardless of whether a connector has been fully or partially deployed to the system in question. Additinally, a new client component intercepts Access Denied error messages on Windows workstations and allows users to proceed directly to the appropriate access request page.
Idan Shoham, CTO of Hitachi ID Systems, said: Hitachi ID Management Suite 6.1 is a major milestone in our program to deliver a high-value, low-cost solution to customers. It introduces strategic
features such as RBAC enforcement, innovative technologies such as real-time user provisioning and significantly improved usability. The new version reduces deployment time by avoiding the need to deploy complex business logic on systems of record.
Hitachi ID Management Suite includes Identity Manager, for provisioning, managing access rights and identity attributes and deactivating users; Group Manager, for managing user membership in security groups; Access Certifier, for periodically reviewing and remediating access rights; and Org Manager, for constructing and maintaining organisational relationship data.