Agilysys
![](https://hl.avatier.com/wp-content/uploads/2024/05/application-connectors-icon-1.png?w=3840)
Enterprise Apps ⋅ In-House Apps ⋅ Even Cloud Apps
Agilysys
Agilysys LMS
Agilysys
Agilysys LMS ARTS
Agilysys
Agilysys LMS Cashier
Agilysys
Agilysys LMS Showgate
Agilysys
Agilysys MMS
Bally
Bally SDS
Bally
Bally SMS
Bally
Bally Technologies ACSC - Casino
Bally
Bally Technologies ACSC - Slot
Blackboard
Blackboard Enterprise Suite
Cherwell
Cherwell
Citrix
Citrix
CMS400
CMS400
Concur
Concur
Epic
EPIC
SOAPS
Generic Web Service (SOAPS)
GENBAND
GENBAND
Google Apps
Google Apps
HP
HP Service Desk
Infinium
Infinium HCM/FSM
Infor
Infinium Self-Service
Infor
InfoGenesis POS
JD Edwards
JD Edwards Enterprise One
JD Edwards
JD Edwards One World
Kronos
KRONOS AS/400
Kronos
KRONOS AS/400 User/Manager
LDAP
LDAP
Lotus Notes
IBM Lotus Notes (ID Files)
Lotus Notes
IBM Lotus Notes (Web Accounts)
McAfee Endpoint
McAfee Endpoint Encryption
McKesson
McKesson Horizon Clinical Infrastructure (HCI)
Micros
Micros 9700 POS
Microsoft
Microsoft Forefront
Microsoft
Microsoft Lync
Microsoft
Microsoft Office 365
Netsuite
Netsuite
oAuth
oAuth
OpenID
OpenID
Oracle
Oracle E-Business Applications
PeopleSoft
PeopleSoft Remote 8.1/8.4
PeopleSoft
PeopleSoft 8.4 Above
Custom App
Remote Command Line
Salesforce
Salesforce CRM
SAP
SAP ECC using RPC
SAP
SAP ECC with SOAP
SCIM
SCIMService NowService Now
Service Now
Service Now
Slack
Slack
SuccessFactors
SuccessFactors
Table Manager
IGT Table Manager
HP
HP Tru64
HP
HP VMS
HP
HP-UX
IBM AIX
IBM AIX
IBM
IBM z/OS (ACF2)
IBM
IBM z/OS (OS/390)
IBM
IBM z/OS (Top Secret)
IBM
IBMIBM iSeries (AS400)
Linux Arch
Linux Arch
Linux CentOS
Linux CentOS
Linux Debian
Linux Debian
Linux Gentoo
Linux Gentoo
Linux Fedora
Linux Fedora
Linux Knopixx
Linux Knopixx
Linux Kubuntu
Linux Kubuntu
Linux Mandriva
Linux Mandriva
Linux Mepis
Linux Mepis
Linux Mint
Linux Mint
Linux Mandriva
Linux Mandriva
Linux Pardus
Linux Pardus
Linux PCLinuxOS
Linux PCLinuxOS
Linux Redhat
Linux Redhat
Linux Sabayon
Linux Sabayon
Linux Slackware
Linux Slackware
Suse
Linux Suse
Ubuntu
Linux Ubuntu
XUbuntu
Linux XUbuntu
Windows AD
Windows ActiveDirectory
Windows AD
Windows Workstation/Server(Local Accounts)
Sun Solaris
Sun Solaris
Active Directory
Active Directory
Directory Server
IBM Directory Server
Directory Server
Linux Fedora Directory Server
AD LDS
Microsoft AD LightweightDirectory Services (AD LDS)
eDirectory
Novell eDirectory (NDS)
OpenLDAP
OpenLDAP
InternetDirectory
Oracle InternetDirectory
InternetDirectory
Oracle ODSEE
InternetDirectory
Oracle Unified Directory
SUN
Sun Java System Directory Server (iPlanet, Sun ONE)
IBM DB2/UDB
IBM DB2/UDB
MS SQL Server
Microsoft SQL Server
MySQL
MySQL
Oracle Database
Oracle Database
Sybase
Sybase
Teradata
Teradata
ActivCard
ActivCard
Authentication
ActivIdentity Authentication
Provisioning
ActiveIdentity Provisioning
Avatier MFA
Avatier MFA Biometric
Avatier OTP
Avatier OTP Email
Avatier OTP
Avatier OTP SMS
DUO Security
DUO Security
Authentication
AuthenticationGoogle Authenticator
Radius
Radius
RSA SecurID
RSA SecurID
SAML
SAML
Symantec VIP
Symantec VIP
Okta
Okta
Ping ID
Ping ID
Open ID
Open ID
Avatier automates IT operations. Our software features self-service administration, automated approvals, and built-in audit controls for user provisioning, access management, group management, access certification, password resets, and enterprise risk management.
Our identity management software deploys in the shortest time at the lower costs, because it ships with over 80 application, system, and database connectors out of the box. Due to our configuration over development approach to deploying an IAM solution, Avatier’s identity management and cyber security software deploys in weeks rather than months.
Avatier introduces a unified framework for business processes across operations. Our identity and access management software enables customization without coding. Avatier transforms operations by reducing support requests and providing optimum IT security. Avatier is the only company offering IT self-service administration capabilities targeting the business user and adaptable to the needs of an organization. Our advanced connectors make IT risk management and compliance possible using a fraction of resources to make it happen.