Accueil Digital Identity Identity Governance & Administration

Identity Governance & Administration

Regain absolute control over the lifecycle of your identities

The right law, to the right person, at the right time

What are the identities of Information System users? What rights do they have to Information System applications? Why have these rights been granted? Are these rights still legitimate and compliant? The absence of immediate answers to these questions is a critical flaw. The IGA offer automates the management of your authorizations and secures your personnel movements (arrivals, mobility, departures).

Transform the complexity of your infrastructure into a fluid, reliable and fully auditable governance system.

Disseminate quality information within your Information System

Identity repository

Build a master repository containing all the identities of Information System users, including employees, trainees, temporary staff, service providers and even suppliers and partners.

Centralize other types of complementary data, such as organizational structure or location information.

Accounts and rights repository

Build a repository of theoretical identity rights, enabling you to know at all times what an identity is entitled to within the IS.

Sharing reference data

Make it easy to use your data wherever it’s needed, by distributing your reference information to all your IS applications and services.

Whether it’s access via LDAP protocol, exposed APIs or a data synchronization engine.

Governance / Audit and Compliance

Trace all actions carried out on your accounts and rights to guarantee total auditability. Use our standard reports or build your own specific reports.

The aim is to enable the distribution and use of reference information by other applications / services making up the IS. This can be via access through an LDAP-type protocol, exposed APIs or a data synchronization engine.

Define risk levels for your various rights, and prioritize your controls on high-risk users.

Automatically compare the status of your target systems with your approved access policies. Ensure that the rights actually held strictly match the theoretical rights validated.

Launch regular review campaigns to confirm that access is appropriate for your employees’ activities. Involve line managers or resource owners directly in validating rights..

To ensure that a user’s rights are always in line with his or her activity, regular rights certification campaigns are possible, for example via the line manager or the resource owner.

Governance / Audit and Compliance

Decentralize your management activities by offering your users dedicated interfaces to control their own identity. Let them modify or add to their personal data, make access requests or set up delegations of responsibility. You can also guarantee total autonomy over password management, with propagation mechanisms to all your target systems.

The leader in high-risk identity protection

Specialized team

A team of experts with an average of 7 years’ experience in consulting and 4 years in technical integration.

Major technological alliances :

Active partnerships with world leaders (SailPoint, Saviynt, Ilex International, One Identity) to guide you towards the most sustainable solution.

Field experience

Over 30 editor certifications and a track record of 120 projects delivered, ranging from strategic scoping to complex integration with a commitment to results or resources.

DAG: Data Access Governance

Protect your office and multimedia documents by classifying your sensitive data, whatever the format.
Accurately manage and control access rights, whether your files are stored on in-house systems or in cloud environments.

Do you have a Digital Identity project?
Access Management
Customer Identity & Access Management
Identity Governance & Administration
Privileged Access management
Maintaining operational conditions
Third-party application maintenance
Framing and steering projects

Incident response

CERT contact details

Mail: cert@synetis.com

Telephone: 02 30 21 31 04

USER ID : CERT SYNETIS

KEY ID : 2F6F A FE30 7877

PGP key fingerprint: 8D8ACAAC20557C7C1FF58332F6FA110FE307877

CERT Synetis is in the process of obtaining PRIS (Prestataires de Réponse aux Incidents de Sécurité) qualification from ANSSI (the French national agency for security incident response).

Incident response

CERT contact details

Mail: cert@synetis.com

Telephone: 02 30 21 31 04

USER ID : CERT SYNETIS

KEY ID : 2F6F A FE30 7877

PGP key fingerprint: 8D8ACAAC20557C7C1FF58332F6FA110FE307877

CERT Synetis is in the process of obtaining PRIS (Prestataires de Réponse aux Incidents de Sécurité) qualification from ANSSI (the French national agency for security incident response).

Contact our Audit team