Products
MAYI ID is the comprehensive solution that orchestrates your entire digital identity landscape, like an anthill would do. Indeed, our solution provides a structured and integrated approach to identity security
MAYI ID is the comprehensive solution that orchestrates your entire digital identity landscape, like an anthill would do. Indeed, our solution provides a structured and integrated approach to identity security
Identity and Access Management
Our MAYI IAM provides a secure entry point, able to manage users and memberships in real time . It takes care of the entire user identity lifecycle through our Directory Management, offering both modern and legacy Single Sign-On (SSO), governance, multi-factor authentication (MFA), and attributes such as Windows Hello for Business
Manages users, group of users, users’ group membership (privileges) for internal or external identity source, through approval procedures
Uniquely consents to define applications and propagation group through approval processes for both internal and external applications
Enables the use of an external identity provider (e.g. Azure) and delegates the authentication to Entra ID, allowing Azure identities to connect to MAYI ID
Manages all tenant-related configurations
Provides all the functionalities for you as a user. It lets you manage independently tokens, personal documents, contact details, invitations, approvals, requests, and external plug-ins
Provides access to the user cannot log ing. This happens through one-time passwords (OTP), via mobile phone or email address, and magic questions
Contact or other information is collected and authentication methods are registered to eventually onboard users on MAYI ID
Enables the ability to perform actions on behalf of another user. It allows to create, unenroll, and unlock admin groups, privileges, as well as managing lifecycle of such users
Activates different authentication methods (or IDP) and provides a single access point for users to securely log in to applications
Used to manage fully customized approval configurations and email templates and to set the approval level granularly
Provides dashboards for different populations. Defines objects and creates shortcuts to different applications, approval processes, agent connections, and RDP connections
Users can access all the applications without any other needs to reauthenticate. Our Modern SSO uses protocols such as SAML and OpenID
Priviliged Access Management
Our PAM approach is characterized by offering products like connection manager agent, privileged access and identity management infrastructures, remote gateway, and session recording. It provides multi-layered security approach that protects against unauthorized access from both internal and external threats and ensures granular access controls
Core of the MAYI PAM module. Here our secrets – sensitive information to be kept secure – are stored and created using customizable-field templates. Manages the permissions, audit log view, handles lifecycle of passwords, conducting regular checks to ensure password validity
Flexibly organizes secrets in folders and subfolders, possibly following a hierarchical order and respecting role-based access control settings
Central place to define SSO to any type of application consuming a secret and store connections via the agent or injector
MAYI PAM supports SSO for legacy authentication protocols. Moreover, it covers SSO to web applications via F5 injection of credentials
Through regular changes, new passwords, and history check, it enhances security and compliance
Resets automatically the password and do the reconciliation to make the re-alignment again. It streamlines password management, enhance security, and simplify user access within the organization
Provides a secure entry point for users to access critical systems. It establishes a connection from the secure gateway to internal resources via desired available protocol and is necessary for Session Recording
Session recording
Captures a video or creates a log that records the session taken during privileged sessions. It provides a detailed audit trail for compliance purposes and investigation in the event of a security incident or any suspicious activities
Certificate Lifecycle Management
MAYI CLM facilitates secure authentication while remaining agnostic to the underlying Public Key Infrastructure (PKI) provider, therefore, addressing both public and private Certificate Authorities (CA). It has been developed with meticulous expertise and does not require any technical knowledge of certificate management
Detects certificates validity, e.g. expiration date
Provides a centralized platform to manage all certificates and enables some unique functions (e.g. certificate take-over) coordinated by approval flows
Enables a complete transparent automation of the distribution to the target system as MAYI CLM supports multiple different automation protocols
Operates with different PKI providers, providing flexibility and preventing vendor dependency as it supports both public and private Certificate Authorities. Built-in IGA allows for customizable approval processes to be implemented
Puts and holds a private key in a vault to use it at any time on different devices, further reinforceable by a HSM
Detects certificates validity, e.g. when they are expired, revoked, having certificate or (TLS) configuration issues
Administration Console
MAYI HILL is the heart of the solution which allows a multi-tenant architecture, enables access to different environments through role-based access control (RBAC). Within MAYI HILL, the groups, privileges, approval, and notifications are defined centrally for all modules (IAM, PAM, CLM)
Configures global settings for all the tenants and gets visibility of the setup cross-tenant. This enables the swift deployment of an entire tenant in a matter of hours rather than the usual days or weeks
Manages the tenant’s affairs directly. This includes the ability for the administrator to set comprehensive policies, such as Identity Governance and Administration (IGA) rules, along with tailored parametrization
Seamlessly integrated into the solution, IGA plays a vital role in tasks such as duty segregation, role management, auditing, and reporting. It allows configuration of key solution components, customizable email templates, application catalog setup as well as resource and role mapping flexibility
Offers a centralized platform for logging in via various identity providers and consolidates authentication logs in one central location – streamlining user experience, saving time and enhancing security
Stores sensitive data in an encrypted way converging within PAM, IAM, CLM, and external applications, this component elevates the level of security
Generates comprehensive reports on various statistics, offering insights into product usage across features and licenses. This transparency is invaluable for understanding costs and expenses, aiding in effective budget planning
Option to interact with, input, and receive information in various languages, improving users’ accessibility and usability
Hardware Security Module
The MAYI Hardware Security Module (HSM) enhances security through tamper-proof hardware, protection against key theft or misuse, reliable key generation and storage, and streamlined compliance with encryption standards.
It creates distinct cryptographic domains with unique keys and access controls, allowing multiple tenants or applications to securely use a single HSM in the cloud. Ensures a fast transition to new partitions, which results in significant time and cost savings.
The encryption key is generated on the HSM and effortlessly imported into your chosen environment. The key ceremony, conducted with witnesses and thorough documentation, ensures stringent governance and uncompromised security.
Allows to own and independently manage the key within the HSM partition. In addition, empowers the user to instantly deactivate keys if necessary and implement custom encryption algorithms. This not only fortifies regualtory compliance, but also eliminates any provider lock in.
By separating responsabilities one system focuses on data encryption and the other on key encryption. The combination between BYOK and BYOE methods ensures that the data remains protected and unbreached.
Carries out encrypted backups with multi-location redundancy, aiming at regulatory standards compliance and operations continuity. Enables seamless HSM key management, which maintains data accessibility and reduces administrative overhead.