Avatier Identity Anywhere Features
Authentication Options (6)
Authentication User experience
Process of providing credentials and logging into multiple systems is easy and intuitive for users
Supports Required Authentication systems
Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc.
Multi-Factor Authentication
Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are.
Supports Required Authentication Methods/Protocols
Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case
Federation/SAML support (idp)
Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials.
Federation/SAML support (sp)
Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider.
Access Control Types (5)
Endpoint access
Provides ability to control access to PC's, Mobile devices, and other endpoint devices.
Local Access
Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network.
Remote Access
Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network.
Partner Access
Controls access to users that are not company employees that are either within the companies local area network or outside the network
Supports BYOD users
Enables users to use their own device to access company applications.
Administration (18)
Ease of installation on server
Installation process is easy and flexible.
Password Policy Enforcement
Options for resetting and enforcing password policies
Administration Console
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks
Ease of connecting applications
Easily provisions new systems, platforms or applications using configuration and not customization.
Self Service Password Administration
Users can set, change passwords without interaction from IT staff
Reporting
Standard and customized report creation to ensure appropriate access rights have been assigned
Mobile App
Provides mobile application that alerts administrators of potential issues and allows administrators manage access rights
Ease of set up for target systems
Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured
APIs
Provides appropriate application interfaces to enable custom integrations for unique business requirements
Bi-Directional Identity Synchronization
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application.
Policy Management
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes.
Cloud Directory
Provides or integrates with a cloud based directory option that contains all user names and attributes.
Application Integrations
Integrates with common applications such as service desk tools.
Password synchronization
Syncronizes passwords across company systems.
Centralized management
Provides a tool for IT administrators to manage the software.
Group policy complexity controls
Configure specific policies for users or groups using group policy objects.
Multiple policies
Supports multiple password policies.
Multi-lingual
Supports multiple languages.
Platform (7)
Multiple Operating system support
Supports Endpoint access control to multiple operating systems
Multi-Domain Support
Allows user authentication to be honored by all the hosts in two or more domains
Cross Browser support
Support access to browser based applications across required browser types
Fail over protection
Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate
Reporting
Contains pre-built and custom reporting tools to required to manage business
Auditing
Provides mechanism for auditing authentication for trouble shooting purposes.
Third Party Web Services support
Can call and pass credentials to third party web services.
User on/off Boarding (6)
Self Service Access requests
Users can request access to an application and be automatically provisioned if they meet policy requirements
Smart/Automated Provisioning
Automates account/access rights creation, changes and removals for on-premise and cloud apps
Role Management
Establish roles that create a set of authentication rights for each user in the role
Policy Management
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes
Access Termination
Terminate access to multiple applications based on dates
Approval Workflows
Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow
User Maintenance (3)
Self Service Password Reset
Enables users to reset passwords without administrator interaction. Enforces password policies when resetting.
Bulk Changes
Change users and permissions in bulk
Bi-directional Identity Synchronization
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application
Governance (2)
Identifies and Alerts for Threats
Alerts administrators when inappropriate access occurs
Compliance Audits
Proactively audits access rights against policies
Usability & Access (5)
Quick Login
As reported in 18 Avatier Identity Anywhere reviews.
Expedites user logins using methods like a master password or password autofill.
Browser Extension
Integrates the tool with your browser for easy use.
Mobile App Usability
This feature was mentioned in 12 Avatier Identity Anywhere reviews.
Integrates with your mobile device for use on mobile apps.
Multi-Device Use
This feature was mentioned in 14 Avatier Identity Anywhere reviews.
Enables user to use the tool across multiple devices.
Admin Management
As reported in 21 Avatier Identity Anywhere reviews.
Allows an employer or administrator to manage employee access.
Security Measures (3)
Password Generator
17 reviewers of Avatier Identity Anywhere have provided feedback on this feature.
Generates passwords for each of your logins.
Two-Factor Authentication
As reported in 12 Avatier Identity Anywhere reviews.
Provides extra security by requiring an extra for of verification in addition to a password.
Security Audits
Based on 15 Avatier Identity Anywhere reviews.
Analyzes and evaluates the quality and variety of your passwords.
User Experience (3)
Self-Service Experience
Allows users to set, change passwords easily without interaction from IT staff.
Mobile App Usability
Integrates with your mobile device for use on mobile apps.
Multilingual Support
Accommodates multiple languages.
Authentication (4)
Multi-Factor Authentication
Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are.
Biometric Authentication
Uses biometric trait or characteristic to authenticate. Additional hardware may be required to support this type.
Other Authentication Methods
Provides authentication capabilities outside standard authentication methods such as MFA and biometric .
Role-Specific Authentication
Able to assign authentication requirements for different levels of users, such as more robust authentication for senior level executives.
Functionality (10)
Active Directory integration
Intetgrates with Active Directory.
LDAP integration
Integrates with Lightweight Directory Access Protocol (LDAP)-based directory services.
Hacker dictionary
Utilizes existing known hacking dictionaries to disallow users to select passwords that have been compromized.
Custom blacklist dictionary
Allows administrators to create a custom blacklist to disallow employees from using specific words in their passwords.
User provisioning
Simplifies or automates user provisioning, deprovisioning, and other user role changes.
Password manager
Offers password management tools to end users.
Single Sign-on
Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts.
Enforces policies
Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data.
Authentication
Authenticates users prior to granting access to company systems.
Multi-factor authentication
Offers multi-factor authentication methods to verify a user's identity.
Compliance (3)
NIST-compliant
Complies with the National Institute of Standards and Technology password best practice recommendations.
NCSC-compliant
Complies with the National Cyber Security Centre (NCSC) password best practice recommendations.
Section 508-compliant
Compliant with Section 508 to enable employees with disabilities to use this software.
Type (2)
On-premises solution
Provides an IAM solution for on-prem systems.
Cloud-solution
Provides an IAM solution for cloud-based systems.
Reporting (4)
Tracking
Tracks user activities across protected systems.
Reporting
Provides reporting functionality.
Access & Permission Change Reporting
Log and report all modifications to user roles and access rights.
Compliance & Audit Trail Export
Provide standardized reports for regulatory compliance and audits.
Golden Record (6)
Patient Record Matching
Mines patient data records to accurately identify and match patient records to resolve identities.
EHR Integration
Integrates with electronic health records (EHRs) and other patient health information databases to better match patient records.
Machine Learning Technology
Leverages fuzzy matching and machine learning technology to set rules to perform identity resolution.
Regulatory Compliance
Ensures compliance with HIPAA, GDPR, and any other regulations that may require adherance to as patient information is mined and matched across a variety of database types.
Fraud Prevention
Supports and/or facilitates the uncovering of patterns and connections within patient data, to prevent fradulent claims or usage.
Optical Character Resolution (OCR)
Leverages OCR technology to convert scanned, imported, or uploaded patient data into digitized, searchable text
Authentication & Authorization - Identity and Access Management (IAM) (1)
Adaptive & Contextual Access Control
Grant access based on user attributes, location, device posture or risk.
Administration & Governance - Identity and Access Management (IAM) (2)
Identity Lifecycle Management
Automate onboarding, offboarding, and access reviews throughout user lifecycles.
Self‑Service Account Management
Enable users to reset passwords and update profiles without admin support.
Generative AI - Identity and Access Management (IAM) (3)
AI‑Driven Access Anomaly Detection
Identify unusual access patterns using machine learning models.
Automated Policy Tuning
Dynamically adjust access policies based on risk and AI-generated insights.
Predictive Role Recommendations
Suggest appropriate user roles based on usage patterns and peer behavior.




