Identity and Access Management
Rathon-IAM
Centralised, unified management of accounts and permissions for both security and operational efficiency.

Security governance for unified
account and access management
Rathon-IAM is a solution that enables unified management of user accounts
and access across all systems in the enterprise. It provides enhanced identity
governance capabilities to effectively manage users in both on-premises and
cloud environments.
It also helps you meet audit and compliance standards, and gives executives
a clear view of the accounts and permissions within your organisation. It
enhances both security and efficiency by minimising unnecessary privileges
and, where required, enabling quick attestation and additional authentication.
Features
Secure unified
account platform
-
Account lifecycle

- Grant access based on defined roles, rules, and policies. Provide a standard onboarding and offboarding process for employees and contractors, and quickly and easily manage resource access as users' responsibilities change as your business grows.
-
Access authentication

- Simplify account governance and management processes, including user account management, privilege control, and more. Make it all happen by empowering authorised business users with user management and access control.
-
Synchronising data

- Perform real-time synchronisation of user accounts, organisations, permissions information, and more across all systems.
-
Management Console

- Authorised admins can centrally manage user accounts, access rights, and more through the admin console.
-
Audit

- Provide audit capabilities to meet ongoing compliance requirements. Provide auditors with detailed, real-time audit data that includes identity governance and management data about what resources are in the environment, who has access to those resources, when access was granted, and the reasons for granting and revoking that access.
-
Support for various
services/systems
- We offer a wide range of adapters for LDAP, AD, DBMS, SAP, EAI, and more for easy system integration.
-
Monitoring illegal
accounts
- Provide auditing capabilities for accounts created outside of the management process. Provides the ability to update and delete information for detected accounts.
-
Role-based access
Control management
- Provides the ability to grant and manage permissions to users based on roles.
-
Quality

- Get GS certified
Architecture
Key features
-
01
Account lifecycle management
- Role/rule/policy-based access authorisation
- Automatic provisioning and deprovisioning of accounts for new hires, contractors, job
changes, etc. - Standardise and centrally manage resource access rights
-
02
Access authentication
- Control user accounts and permissions
- Simplify account governance and management processes
- Business user-centric rights management with delegation of rights
-
03
Synchronising data
- Real-time synchronisation of user account, organisation and permissions information
- Support for unified account and rights management across systems
-
04
Management Console
- Provides a unified management console for central administrators
- Enables monitoring and management of user accounts, access rights
-
05
Audit and compliance support
- Meet compliance and security audit requirements
- Monitor real-time audit data and risk-based permissions
- Provide anomaly detection
-
06
Integration with various services/systems
- Integrates with major enterprise systems such as LDAP, AD, DBMS, SAP, EAI, etc.
- Enables unified account/permission management across heterogeneous systems









