A complete and reliable solution fully customized on your needs

Centralized
management
From a single console you can manage the full lifecycle of accounts owned by employees, customers, suppliers and visitors, with control over access permissions to all resources owned by the organization.
Authoritative
systems synchronization
The process of user enablement will not be subject to manual actions, pointlessly long and tedious. With our solution all the data from authoritative systems (company HR, for example) will be automatically distributed across the target applications according to specific business rules, so that each user is operational in the shortest time possible.
 
Automated
provisioning
Creating, disabling and optionally removing user accounts onto various systems as Active Directory, LDAPv3 systems, time-tracking, physical access management devices, etc. will not be requiring manual actions, subject to inevitable human errors. With our solution it will be possible to automate such operations by simply defininig specific business rules that appropriate software components will enforce.
Email box and
home directory management
Managing email boxes will not be an issue any more. Create, disable and any possible operation including removal could be delegated to appropriate automated tasks provided by the system to support the onerous management activities erogated day by day by IT infrastructure's staff.
Permissions
Finding and defining access permissions to resources is often a long, difficult process. Thanks to our solution it will be possible to define once for all the specific business rules to process user roles and to automatically define access permissions to logic and physical resources as labs, parking areas and libraries.
cerchio1cerchio2cerchio3cerchio4cerchio5cerchio6improntaluce
Single Sign-On
Access
Managing credentials and permissions is becoming increasingly difficult due to the proliferation of new applications. Our solution allows to configure, in a single point, access control in order to allow the validation of the most different types of user credentials, and single sign-on access to the various web applications available.
Domain SSO
If a Microsoft® domain is present, it will be possible to allow all domain users to access web applications in the company intranet with no need to provide additional credentials, once domain authentication has been performed.
 
Federation
Adopting our solution quickly allows, thanks to supported standards as OpenID Connect, OAuth 2.0 and SAML 2.0, to federate with other organizations in order to provide services to external users pertaining to organizations with which a reciprocal trusted relationship exists.
  • card
  • card
  • card
  • card
  • card
  • card
  • card
  • card
  • card
  • card
Discover all
other features
pointercard
  • Self-management and approval

    With purpose of simplifying user lifecycle management, but especially to comply with privacy regulations (as GDPR), our solutions allows user to self-manage their own personal data, preserving the possibility to submit to approval each change configured as particularly relevant.

  • Password reset and update

    User credential management is always an expensive and very unrewarding activity. It is now possible to let users autonomously reset their own password in order to restore access to services they are allowed to.

  • Physical access

    Today our solution gives the chance to control from a single point all accesses to both logical and physical resources as parking areas, labs, reserved / danger areas, and libraries. This control is enforced through generation and propagation of specific access rules onto hardware and software systems responsible for such checks.

  • Credential generation

    With our solution it is possible to generate and assign to users logical credentials (as traditional username and password) but also physical credentials as RFID tags. The system could be in fact configured to remotely interact with hardware and software systems for tag issuance with purpose of centrally manage whatever credential type.

 
Want to see
the software
in action?
Try our demo and discover how easy identity and access management can be
Access to the base demo
we have prepared for you.
Contact one of our consultants and obtain a demo designed for your needs.
You will be guided by a developer to quickly understand product capabilities, or you could ask for tailored features.
We have solved complex problems in a simple way
Read the stories of who did already choose Tirasa for digital identities
Developed with
immagine opensource
Open Source Software
Benefits and Regulations
All around the world, Open Source software is strongly recommended - when not mandatory choice - for Public Administration, when it comes to acquisition and reuse of software.
As an example, the Open Source Observatory and Repository (OSOR) is a project launched by the European Commission for exchanging information, experiences and best practices around open source solutions for use in public administrations.
This happens because open source software is recognized as inherently robust and secure, and preserves by nature its adopters from vendor lock-in.
In this perspective we can not but play a leading role.
The philosophy that guides our company in its daily operating choices, the care and the ways in which it creates solutions for its customers as well as the total absence of proprietary licenses make Tirasa the "virtuous" supplier for Public Administration.