Identity Management



The key is "Permissioned access by users or system processes to the authenticated resources"


To identify oneself is to say who you are: In the case of interactions between human beings, if for example you knock on the door of a neighbor, to your question of "who is it?" You will answer with your name. You will be identifying.



Authenticate is to show that you are who you say you are: When your neighbor looks through the peephole, your face will serve to authenticate you. He will know that you are who you say you are, because he will recognize you by your physical features. It will recognize your identity.


TradeChain solves througth its IAMaaS Services the Authentication, Authorization and Accounting process in a transparent way, administering the secure request/token/session rules until the complete satisfaction of the trust relationships is satisfied before allowing the requesting party to access the services, determining their capacity to consume resources, repositories and applications, based on the assignment and/or detection of profiles, roles, attributions and rules.



Provides workshop-type tools to configure standardized policies, delegating to the rules engine the adaptation of the behavior of the Platform according to the declared parameters that allow defining situations and moments in which to implement the authorization control and access authorization. 


In this order, the Platform provides entire control of every your users and covering end-to-end chain of authentication, authorization and accounting to all apps from a single entry point and also, IAMaaS is the point of integration -interoperability- of new services to the Model, providing the interfaces so that the IT user can perform the complete management during the entire life cycle of any application. The User can consult the information associated with the instance: URL, ID, provisioned services, security key, authorizations history, etc. User can also configure any parameter, assign or deassign resources: RAM, Caches, DDBB instances, etc ... available for a specific application or for a group of instances of a specific client.