
Alibaba Cloud Identity as a Service (IDaaS) is a cloud-based identity and access management service (IAM) covering comprehensive functions that enable user portal, user directory, flexible authentication, single sign-on, centralized authorization, and audit reporting.
Vendor
Alibaba Cloud
Company Website




Overview
Alibaba Cloud Identity as a Service (IDaaS) is a cloud-based identity and access management service (IAM) covering comprehensive functions that enable user portal, user directory, flexible authentication, single sign-on, centralized authorization, and audit reporting.
Provide Enterprise-Level Unified Identity Service
IDaaS plays a central role in enterprise identity management by removing ID silos and enabling one account-access-all function. IDaaS incorporates advanced security technologies that will facilitate identity management and enable enterprises to enhance their identity security to improve management efficiency.
Eliminate Redundant Passwords for All Users
IDaaS supports all standard SSO protocols, which allows enterprises to connect to all mature enterprise services. Passwords are eliminated and security risks are reduced significantly. Users can painlessly and securely store dozens of passwords.
Connect Identities among Sources across Cloud Platforms
IDaaS may serve as a bridge for other cloud platform identities to be connected to Alibaba Cloud. A cloud identity management solution is usually the fundamental requirement for an enterprise to set foot in cloud services. IDaaS can bridge identities between Alibaba Cloud, private environments, and several public cloud providers.
Features
Application Docking web applications, mobile applications, desktop applications, and IoT devices provide users with integrated services that include access control, single sign-on, and application portals. Authorization According to the department or role of the user, the accessible range can be managed easily. Authorization or revocation can be centralized to achieve one configuration and take effect globally. Account Provide unique user identity data for enterprise information construction with complete account life cycle management. Audit Trace user behaviors and provide real-time audit reports to keep managers informed about the efficiency of the company’s digital assets. Authentication Centrally verify user identity, configure multi-factor authentication (MFA), and support third-party authentication sources.