Identity Management for DBMS

The beginning of the system security management are 'Manage' and 'Audit'
HIWARE Identity Management for DBMS collects the accounts scattered across DBMS and automatically manages account life-cycle and password from creation to deletion according to the security management policy. It saves time and costs for DBMS accounts management through unified and automated identity management and offers more efficient work environments.


Decrease in work efficiency due to manual account mangement
Failure to comply with the security policy such as password complexity and password change cycle
Security incidents caused by hack of accounts of terminated employees or dormant accounts

Benefits from HIWARE Identity Management for DBMS

Improvement of work efficiency by minimizing the consumption of identity management resources through automation
Easy compliance with regulations through automatic password management policy setting
Prevention of account hack by deleting remaining accounts

HIWARE Identity Management Solutions

Identity Management for System
Linux/Unix, Windows, Network, Security Devices
Identity Management for Database
Identity Management Active Directory

Main Features

  • Collects accounts of all systems and OS in HIWARE’s agentless technology.
  • Improves security with SSH collection mode
  • Provisioning management such as creation/ change/ deletion of accounts in batch
  • Application and management of account policies in diverse ways
  • Linkage with all systems and easy real-user synchronization
  • Automatic authority setting & password management on each user account
  • Integrated management of passwords
  • Auto-password change through scheduling
  • Diverse creation rule setting and periodic password change
  • Notifying the administrator of password change
  • Change password before expiration
  • Integrated management after collection of accounts scattered across heterogeneous devices
  • Management policy planning and customized management by account attribute
  • Authorization with grant type for protocol, period, auto/semi-auto login
  • Auto deletion of conventional authorities and mapping of the basic authority data of HR system such as reshuffle the personnel
  • Regular check on the validity of user account
  • Auto detection of threatening from ghost/ broken, inactive and locked accounts
  • Detection of accounts with an expired ID/Password and auto-locking
  • Auto locking and deletion of unnecessary accounts
  • The locked account can be released after getting a permit from the administrator
  • DBMS authority setting by table
  • Authority setting by period