Password Management

Eliminate passwords with Keycloak, and increase access request agility. We support MFA SSO and SAML based authentications across all commonly found applications.

Password Manager.png

Setup User Logins

Creating users via Service Request will provide default passwords for users to use and login to IDHub. However, password management is an important feature in any Identity management application and is very specific to every organization. 

create-new-user-SR

Keycloak Password Manager

keycloak

IDHub uses Keycloak to manage its password and SSO capabilities. Listed below are the different ways passwords can be managed.

  • Use default passwords, set by Keycloak, when creating a new user via IDHub Service Requests
  • Enter a password for each user in Keycloak manually

User Federation

User Federation is a process by which user information is pulled from a target application into IDHub Keycloak, and uses passwords that are present in the application the users are federated from. From the Keycloak Administration tool of IDHub you have the ability to configure user federation.


user-federation-keycloak

SSO/SAML

SSO-Keycloak

SSO/SAML setup is a process by which passwords are avoided completely, and users are allowed to login with an authentication system of another application, to keep a centralized login to all their applications. IDHub inbuilt Keycloak provides administrators an easy way to manage and setup SSO for user logins.

Centralized Login

You can configure the SSO/SAML capabilities using Keycloak, so users are allowed to login with an authentication system of another application, enabling a centralized login to all their applications.

sso-sml-keycloak

Password Management Benefits

  • Default login passwords via IDHub Service Requests
  • IDHub includes Keycloak
  • User Federation capabilities
  • SSO/SML capabilities
Video Tutorial

Microsoft Entra ID (Formerly Microsoft Azure AD) SSO Integration

Identity and Access Management (IAM)

IDHub Free Resources

https://media.sath.com/Screenshot_from_2023_06_16_12_44_24_1aa1286c8f/Screenshot_from_2023_06_16_12_44_24_1aa1286c8f.png

Workflow Basics

Learn Workflow Basics, see our most common workflow scenarios, and brush up on your workflow skills for your own business workflows. Find more resources on our Blog Page!

https://media.sath.com/featured_access_control_policy_template_2_ecd665465b/featured_access_control_policy_template_2_ecd665465b.jpg

Access Control

Learn more about Access Control and utilize our free Access Control Policy Template, to help establish a healthy framework for your organizations access control.

https://media.sath.com/shutterstock_2254102897_07fc7b1f33/shutterstock_2254102897_07fc7b1f33.jpg

The Cost Of IAM

Learn why IAM is so expensive and how the benefits outweigh the initial price tag in our blog post: Why is Identity Management so expensive?