Security Verify Access overview

ISAM supports authentication, authorization, data security, and resource management capabilities. We use Security Verify Access in conjunction with standard Internet-based applications to build highly secure and well-managed intranets.

ISAM provides the following frameworks:

Security Verify Access can be integrated into existing and emerging infrastructures to provide secure, centralized policy management capability. The following resource managers are some of the existing resource managers:

Existing applications can take advantage of the ISAM authorization service and provide a common security policy for the entire enterprise.

Parent topic: Verify Access Platform and Supporting Components administration