What Integrates with Powertech Multi-Factor Authentication?

Find out what Powertech Multi-Factor Authentication integrations exist in 2024. Learn what software and services currently integrate with Powertech Multi-Factor Authentication, and sort them by reviews, cost, features, and more. Below is a list of products that Powertech Multi-Factor Authentication currently integrates with:

  • 1
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory stores information about objects in the network and makes it easy for administrators and users find and use this information. Active Directory uses a structured database store to organize directory information in a hierarchical, logical way. This data store, also known by the directory, contains information about Active Directory object. These objects usually include shared resources like servers, volumes and printers as well as the network user account and computer accounts. See Directory data store for more information on Active Directory. Active Directory security is integrated through logon authentication. This allows for access control to objects within the directory. Administrators can manage their directory and organization through one network logon. Authorized network users have access to all resources on the network. The management of complex networks can be made easier by policy-based administration.
  • 2
    IBM i Reviews
    IBM i is an integrated environment that IBM has created. It includes an operating system, database and middleware. IBM i: A platform by innovators for innovators. The latest version of IBM i is now available. IBM i 7.4 will provide you with continuous availability (thanks for IBM Db2 Mirror For i), the most recent security features and easy integration to IoT, AI, and Watson.
  • 3
    Powertech Password Self Help for IBM i Reviews
    Users can reset their IBM i passwords instantly. This eliminates the need for IT support technicians to process requests. Users don't need to submit a help ticket for password resets. IT can then spend their time on more important issues. The productivity gains are quickly realized, with password resets accounting up to 50% of all help desk calls. To verify the authenticity of users and prevent fraudulent reset requests, a series of challenging questions must be answered correctly before a reset can be approved. Configure settings to comply with security policy requirements. You can set rules about the number of password characters allowed, repetition of characters and case sensitive answers.
  • 4
    Yubico YubiKey Reviews
    YubiKey protects your digital world. Stop account takeovers, make your multifactor authentication passwordless, and modernize it. The world's best security key provides superior security, user experience, and a return on investment. The YubiKey is available in a variety shapes and features to suit your needs, both for personal and professional use. To find the right key, take our Product Finder Quiz. The YubiKey can be used with hundreds of software and services. We are here to help you get started, whether it's for personal or professional use. The industry's most trusted security key. It allows strong multi-factor, two-factor, and passwordless authentication. The multi-protocol YubiKey protects your access to computers, networks, online services, and other digital devices with a simple touch. No more reaching for your smartphone or retyping passcodes. Simply plug in your YubiKey and tap. It will do the rest.
  • Previous
  • You're on page 1
  • Next