Products

MAYI ID is the comprehensive solution that orchestrates your entire digital identity landscape, like an anthill would do. Indeed, our solution provides a structured and integrated approach to identity security


MAYI IAM

Identity and Access Management

Our MAYI IAM provides a secure entry point, able to manage users and memberships in real time . It takes care of the entire user identity lifecycle through our Directory Management, offering both modern and legacy Single Sign-On (SSO), governance, multi-factor authentication (MFA), and attributes such as Windows Hello for Business

Directory Management

Directory Management

Manages users, users’ group memberships across internal and external identity sources. This feature includes customizable approval processes, ensuring seamless handling of user and rights lifecycles, regardless of the identity provider.

Application Catalogue

Application Catalogue

Ensures token integrity with tailored access control. It uniquely defines user-specific application rights, enabling precise group propagation through approval processes for seamless application management.

 

External IDP Integration

External Identities

Logs in effortlessly using your external identity provider, including Azure. Authentication is delegated to Microsoft Entra ID, allowing Azure identities to securely access MAYI ID without extra credentials, streamlining authentication and security.

Single Sign-on (SSO)

Single Sign-on (SSO)

Access to all applications with modern SSO protocols like SAML and OpenID. MAYI PAM portion also enables SSO for legacy systems via credential injection at the gateway level, supporting various protocols and devices, including desktop agents for Windows and Linux.

Self Service

Self Service

Provides all the functionalities for you as a user. Allows to independently handle tokens, personal documents, contacts, invitations, approvals, and requests – all from one place. Enables seamless control over onboarding and external integrations.

Emergency Access

Emergency Access

Provides access to the user when login fails by providing temporary authentication through one-time passwords (OTP) via mobile or email, or through magic questions.

Onboarding Process

Onboarding Process

Collects contact and registers authentication methods efficiently through tailored processes, ensuring a smooth user enrollment. Smart design handles interruptions seamlessly, making onboarding faster and more reliable.

 

Operational Console

Operational Console

Allows to perform actions on behalf of users. Designated users can create, delete, unenroll, and unlock user accounts and admin groups, manage privileges, and oversee user lifecycle. Includes options for helpdesk and contextual audit logs for secure operations.

Identity Governance Administration (IGA)

Identity Governance Administration (IGA)

Manages fully customized approval configurations, email templates for specific actions, workflows, and onboarding, and sets approval levels with granularity. Enables to define templates for users, groups, roles, and privileges – establishing a comprehensive governance framework.

 

Global Dashboard

Global dashboard

Versatile dashboard tailored to different populations. Defines objects and creates shortcuts to applications, approvals, secrets, and both agent and RDP connections. Supports multiple user groups with customized views and simplifies workflows.

MAYI PAM

Priviliged Access Management

Our PAM approach is characterized by offering products like connection manager agent, privileged access and identity management infrastructures, remote gateway, and session recording. It provides multi-layered security approach that protects against unauthorized access from both internal and external threats and ensures granular access controls

Vault

Vault

Core of the MAYI PAM module. Here our secrets – sensitive information to be kept secure – are stored and created using customizable-field templates. Manages the permissions, audit log view, handles lifecycle of passwords, conducting regular checks to ensure password validity

Secret Manager

Secret Manager

Flexibly organizes secrets in folders and subfolders, possibly following a hierarchical order and respecting role-based access control settings

Connection Manager

Connection manager

Central place to define SSO to any type of application consuming a secret and store connections via the agent or injector

Password Policies, Reconciliation and Rotation

Password management and security

MAYI PAM automates password resets, enforces complexity rules, length requirements, and expiration schedules, and ensures seamless synchronization across Active Directory, databases, and network devices. It dynamically generates strong passwords, prevents reuse, and performs real-time reconciliation to maintain security and compliance. With detailed history tracking and automated rotation, it minimizes credential misuse and simplifies access management.

Remote Gateway

Remote Gateway

Provides a secure entry point for users to access critical systems. It establishes a connection from the secure gateway to internal resources via desired available protocol and is necessary for Session Recording

Session Recording

Session recording

Captures a video or creates a log that records the session taken during privileged sessions. It provides a detailed audit trail for compliance purposes and investigation in the event of a security incident or any suspicious activities

Legacy Single Sign-On (SSO)

Legacy Single Sign (SSO)

MAYI PAM supports SSO for legacy authentication protocols. Moreover, it covers SSO to web applications via F5 injection of credentials

MAYI CLM

Certificate Lifecycle Management

MAYI CLM facilitates secure authentication while remaining agnostic to the underlying Public Key Infrastructure (PKI) provider, therefore, addressing both public and private Certificate Authorities (CA). It has been developed with meticulous expertise and does not require any technical knowledge of certificate management

Certificate Lifecycle Operations

Certificate Lifecycle Operations

Detects certificates validity, e.g. expiration date

Unified Certificate Management

Unified Certificate Management

Provides a centralized platform to manage all certificates and enables some unique functions (e.g. certificate take-over) coordinated by approval flows

Automation

Automation

Enables a complete transparent automation of the distribution to the target system as MAYI CLM supports multiple different automation protocols

PKI Agnosticism

PKI Agnosticism

Operates with different PKI providers, providing flexibility and preventing vendor dependency as it supports both public and private Certificate Authorities. Built-in IGA allows for customizable approval processes to be implemented

Key Escrow

Key escrow

Puts and holds a private key in a vault to use it at any time on different devices, further reinforceable by a HSM

Scan Engine

Scan Engine

Detects certificates validity, e.g. when they are expired, revoked, having certificate or (TLS) configuration issues

MAYI HILL

Administrative Console

MAYI HILL is the heart of the solution which allows a multi-tenant architecture, enables access to different environments through role-based access control (RBAC). Within MAYI HILL, the groups, privileges, approval, and notifications are defined centrally for all modules (IAM, PAM, CLM)

Global Administration Console (GAC)

Global Administration Console (GAC)

Configures global settings for all the tenants and gets visibility of the setup cross-tenant. This enables the swift deployment of an entire tenant in a matter of hours rather than the usual days or weeks

Tenant Admin Console (TAC)

Tenant Admin Console (TAC)

Manages the tenant’s affairs directly. This includes the ability for the administrator to set comprehensive policies, such as Identity Governance and Administration (IGA) rules, along with tailored parametrization

Identity Governance Administration (IGA)

Identity Governance Administration (IGA)

Seamlessly integrated into the solution, IGA plays a vital role in tasks such as duty segregation, role management, auditing, and reporting. It allows configuration of key solution components, customizable email templates, application catalog setup as well as resource and role mapping flexibility

Central Login Point

Central login point

Offers a centralized platform for logging in via various identity providers and consolidates authentication logs in one central location – streamlining user experience, saving time and enhancing security

Vault Encryption

Vault encryption

Stores sensitive data in an encrypted way converging within PAM, IAM, CLM, and external applications, this component elevates the level of security

Statdashboard

Statdashboard

Generates comprehensive reports on various statistics, offering insights into product usage across features and licenses. This transparency is invaluable for understanding costs and expenses, aiding in effective budget planning

 

Multilingual Support

Multilingual support

Option to interact with, input, and receive information in various languages, improving users’ accessibility and usability

MAYI HSM

Hardware Security Module

The MAYI Hardware Security Module (HSM) enhances security through tamper-proof hardware, protection against key theft or misuse, reliable key generation and storage, and streamlined compliance with encryption standards.

Partition as a Service

Partition as a Service

It creates distinct cryptographic domains with unique keys and access controls, allowing multiple tenants or applications to securely use a single HSM in the cloud. Ensures a fast transition to new partitions, which results in significant time and cost savings.

Bring Your Own Key (BYOK)

Bring Your Own Key

The encryption key is generated on the HSM and effortlessly imported into your chosen environment. The key ceremony, conducted with witnesses and thorough documentation, ensures stringent governance and uncompromised security.

Bring Your Own Encryption (BYOE)

Bring Your Own Encryption

Allows to own and independently manage the key within the HSM partition. In addition, empowers the user to instantly deactivate keys if necessary and implement custom encryption algorithms. This not only fortifies regualtory compliance, but also eliminates any provider lock in.

Double Key Encryption

Double Key Encryption

By separating responsabilities one system focuses on data encryption and the other on key encryption. The combination between BYOK and BYOE methods ensures that the data remains protected and unbreached.

Backup of the HSM Partition

Backup of the HSM Partition

Carries out encrypted backups with multi-location redundancy, aiming at regulatory standards compliance and operations continuity. Enables seamless HSM key management, which maintains data accessibility and reduces administrative overhead.