Logo AC
AC IDENTITY

Managing employee access and authorization in an organization

Nowadays, a user in an organization typically has access to multiple applications and usually even more user accounts (identities). If you don’t pay enough attention to identity management in your organization, you are running the risk of facing a number of problems that you will have to deal with in the future. Due to poor and non-transparent account and permission management, there is a real security risk of unauthorized access abuse with serious consequences. You will definitely not be pleased with the idea of people taking away data they don’t have access rights to from your organization. AC Identity will help you avoid these problems.

In organizations, we also encounter inefficient identity administration. Administrators manually set up new users in applications based on an e-mail request. In the same way, permission settings and change requests are manually resolved. Wouldn’t it be better to control identities automatically and centrally from one place? AC Identity is the solution that will enable you to do this!

AC Identity - Identity Management System (IDM) by AUTOCONT, is a product solution that offers you the possibility to safely and efficiently manage individual access permissions related to enterprise information systems and applications.

AC IDENTITY HAS THESE UNIQUE BENEFITS:

  • Our IDM is easy to control and administer – AC Identity controls accounts in a complex way and from one location.
  • We offer a set of connectors for individual applications in your organization. By connecting applications to AC Identity, we manage the identities and permissions in your applications.
  • All operations and changes in identity management are recorded in detail and quickly plus clearly accessible in the history view.
  • We do not place a burden on your organization's budget with high licensing fees like other expensive commercial solutions.
  • We provide our customers with a complete professional IT consulting and implementation service.
  • Unlike open-source solutions, we guarantee quality and support.

AC IDENTITY HAS MULTIPLE TOOLS TO STREAMLINE IDENTITY ADMINISTRATION, AS FOR EXAMPLE:

  • Rules – Allows you to automatically create user accounts and set permissions.
  • User Self-Service – Allows users to ask for permissions they need for their work.
  • Workflow – Allows you to set up approval workflow, where managers can approve permission requests of their subordinates. Once approved, AC Identity will automatically set the required permissions.
  • Notifications – Allows you to set up e-mail notifications about identity administration related events. For example, a supervisor will be informed there is going to be a new employee in his department and that they need to set appropriate permissions.

MRS SMITH’S FIRST DAY ON THE JOB

Mrs Smith starts a new job today as an assistant in the sales department. When it comes to new employees, many companies use printed check lists where Mrs Smith’s subordinate checks what systems and with what permissions Mrs Smith should have access to. The request then goes to the IT department. What software tools will you use to give her access to everything she is going to work with?

WHAT MRS SMITH NEEDS WHEN SHE STARTS ON THE JOB

Access to the organization – creating an employee card (adding it into the card system), getting access to the “computer” (adding it to the directory service), setting up an e-mail account and intranet portal access (adding her to the intranet portal and setting appropriate permissions), setting up CRM access (adding her to CRM and setting appropriate permissions), setting up access to work reporting system (adding her to the attendance system and setting appropriate permissions), setting up access to relevant folders and documents in the organization (setting file and management system permissions), adding her into the payroll system. Quite a lot of things, right?

TWO MONTHS LATER …

Mrs. Smith unfortunately did not prove her abilities and is dismissed in her trial period. How easily, quickly and reliably will you be able to deactivate all of her access rights? Can it happen that she will still be able to enter the systems remotely after the termination of her contract?

BENEFITS
FOR IT MANAGERS

  • Enhancing access control security in the organization and its central administration.
  • Accelerating implementation of organizational, technical, and legislative changes and requirements.
  • Consolidating organizational structure, accounts, and authorization data, as part of the implementation of the solution.
  • Clear reporting and preparation of materials for security audit.

BENEFITS
FOR HR MANAGERS

  • Accelerating processes related to employee onboarding and offboarding.
  • Improving lifecycle management possibilities and employee development in the organization.
  • Enabling custom identity management in a modern user organization.
  • Boosting employee satisfaction and the image of a modern organization to recruit prospective, young people.

BENEFITS
FOR MANAGEMENT

  • Accelerating and streamlining internal processes, reducing costs (automation).
  • Enhancing security of access to information and data of the organization.
  • Increasing work productivity – secure access for home-office or field workers.
  • Greater flexibility for organizational changes and changes in employee permissions.
WHAT IS HAPPENING IN THE ORGANIZATION WITH AC IDENTITY WITHOUT AC IDENTITY
Time to change/reset the password In seconds In hours
Duration of execution of changes within the organizational structure In hours In weeks
IT operations related to permission administration Cost reduction by 10 to 30% -
Helpdesk/call centre operations Cost reduction by 10 to 30% -
Employee downtime while waiting for necessary permissions Cost reduction by 2 to 10% -
Preparation of documents for security audit Cost reduction by 60 to 90% -
Costs associated with security threats Savings can be clearly quantified after evaluating assets, security risks and threats when performing a security analysis. -
Costs associated with unused account and license fees Savings are associated with licensing of 1 user in the organization (e.g. CZK 750 = for 40 unconfirmed users CZK 30,000). -

AGROTEC

Implementation of the AC Identity management system, including integration with SAP, Active Directory, MS Exchange, SharePoint company portal, including implemented applications (e.g. contract module).

AC Identity effectively controls the identity life cycle in Agrotec and its subsidiaries. Besides that, AC Identity primarily controls user permissions on the Intranet and SharePoint contract module.

SOUTH BOHEMIAN REGION

Implementation of the AC Identity management system for Regional Authority’s administration of its internal identities and the administration of the external identities established by the organization.

The implementation included integration with the key systems of the organization such as the HR system, records management, corporate directory, e-mail, integration platform, and platform for communication with national registers.

AC Identity manages centrally and automatically permissions for 24 systems of the region.