본문 바로가기 주메뉴 바로가기

Business

Convergence Software & IT Solution Specialist Opasnet

DS Mentoring Chakan IDM/SAC

Introduction
Big Data Platform-integrated Account Management and Security Access Control Solution
Chakan IDM system is a solution which supports safe authentication and authority management service through the connection of EAM and SSO system and the system provides managing functions such as integrated account management, resource account management, approval system, account distribution and synchronization to run corporate account management infrastructure effectively and efficiently. Chakan IDM solution minimizes the costs in corporate system and user’s account management. Further, the solution improves user convenience and enhances internal security to maximize corporate profits because it blocks the arbitrary access to corporate assets and prevents leakage.
Account Management through Centralized Control
  • * Reinforcing business performance efficiency, resulted in providing the account management service in the form of centralized management
  • * Maintaining and managing the latest user account information through user account distribution and synchronization
Enterprise Account and PIN number policies
  • * Providing consistent management by supporting enterprise account and PIN number policies in creating accounts.
  • * Aiding the encryption of PIN number with the support of encrypted algorithm
  • * Reinforcing security level and improving security level

DS Mentoring Chakan SAC

Chakan SAC system supports to find fault causes and recover them by providing real-time monitoring and detecting functions including various protocols (Telnet, FTP, SSH, SFTP and RDP, etc.) to minimize system malfunctions when users access to external system resources (whether it is malicious or accidental). In addition, when the system connected with the integrated account management system of our company (Chakan IDM), it minimizes the costs in system account management, improves user convenience and reinforces internal security to provide the effect on the prevention in the arbitrary access to important assets and their leakage.
User Management
  • * Supporting user registration, change, and deletion, based on self -service
  • * Supporting request and approval schemes for user account management and task-based resource allocation
  • * Aiding complex authentication and user authentication based on ID/Password, OTP and PKI
Controlling Commands, Directories and Files
  • * Controlling commands, directories and files in the form of Black List and White List
  • * Supporting real-time control of files (reading, writing and deletion) and directories (including subdirectories) without additional SecureOS