Unlimited App Support

Enterprise Apps ⋅ In-House Apps ⋅ Even Cloud Apps

Avatier Identity Management (AIMS) Connectors

Enterprise and Cloud Applications

Infinium

Infinium HCM/FSM

Infor

Infinium Self-Service

JD Edwards

JD Edwards Enterprise One

JD Edwards

JD Edwards One World

Kronos

KRONOS AS/400

Kronos

KRONOS AS/400 User/Manager

LDAP

LDAP

Lotus Notes

IBM Lotus Notes (ID Files)

Lotus Notes

IBM Lotus Notes (Web Accounts)

McAfee Endpoint

McAfee Endpoint Encryption

McKesson

McKesson Horizon Clinical Infrastructure (HCI)

Micros

Micros 9700 POS

Microsoft

Microsoft Forefront

Microsoft

Microsoft Lync

Microsoft

Microsoft Office 365

Netsuite

Netsuite

oAuth

oAuth

OpenID

OpenID

Oracle

Oracle E-Business Applications

PeopleSoft

PeopleSoft Remote 8.1/8.4

PeopleSoft

PeopleSoft 8.4 Above

(RCL) Custom App

Remote Command Line

Salesforce

Salesforce CRM

SAP

SAP ECC using RPC

SAP

SAP ECC with SOAP

SCIM

System for Cross-Domain Identity Management

Service Now

Service Now

Slack

Slack

SuccessFactors

SuccessFactors

Operating System

HP

HP Tru64

HP

HP VMS

HP

HP-UX

Linux Arch

Linux Arch

Linux CentOS

Linux CentOS

Linux Debian

Linux Debian

Linux Gentoo

Linux Gentoo

Linux Fedora

Linux Fedora

Linux Knopixx

Linux Knopixx

Linux Kubuntu

Linux Kubuntu

Linux Mandriva

Linux Mandriva

Linux Mepis

Linux Mepis

Linux Mint

Linux Mint

Linux Pardus

Linux Pardus

Linux PCLinuxOS

Linux PCLinuxOS

Linux Redhat

Linux Redhat

Linux Sabayon

Linux Sabayon

Linux Slackware

Linux Slackware

Suse

Linux Suse

Ubuntu

Linux Ubuntu

XUbuntu

Linux XUbuntu

Windows AD

Windows ActiveDirectory

Windows AD

Windows Workstation/Server(Local Accounts)

Sun Solaris

Sun Solaris

Directories

Active Directory

Active Directory

AD LDS

Microsoft AD LightweightDirectory Services (AD LDS)

Directory Server

IBM Directory Server

Directory Server

Linux Fedora Directory Server

eDirectory

Novell eDirectory (NDS)

OpenLDAP

OpenLDAP

InternetDirectory

Oracle InternetDirectory

InternetDirectory

Oracle ODSEE

InternetDirectory

Oracle Unified Directory

SUN

Sun Java System Directory Server (iPlanet, Sun ONE)

Databases

IBM DB2/UDB

IBM DB2/UDB

MS SQL Server

Microsoft SQL Server

MySQL

MySQL

Oracle Database

Oracle Database

Sybase

Sybase

Teradata

Teradata

Multifactor Authentication

ActivCard

ActivCard

Authentication

ActivIdentity Authentication

Provisioning

ActiveIdentity Provisioning

Avatier MFA

Avatier MFA Biometric

Avatier OTP

Avatier OTP Email

Avatier OTP

Avatier OTP SMS

CyberArk

CyberArk

DUO Security

DUO Security

FIDO2

FIDO2

Entrust

Entrust Grid Card

Google Auth

Google Authenticator

Microsoft Auth

Microsoft Authenticator

Okta

Okta Verify

Open ID

Open ID

Ping ID

Ping ID

Radius

Radius

RSA SecurID

RSA SecurID

Salesforce Auth

Salesforce Authenticator

SAML

SAML

Symantec VIP

Symantec VIP

WebAuthn

WebAuthn

WeChat

WeChat QR code

WhatsApp

WhatsApp Magic Link

Yubico

YubiKey

We Configure Identity Management Software Solutions

Avatier automates IT operations. Our software features self-service administration, automated approvals, and built-in audit controls for user provisioning, access management, group management, access certification, password resets, and enterprise risk management.

Our identity management software deploys in the shortest time at the lower costs, because it ships with over 80 application, system, and database connectors out of the box. Due to our configuration over development approach to deploying an IAM solution, Avatier’s identity management and cyber security software deploys in weeks rather than months.

Avatier introduces a unified framework for business processes across operations. Our identity and access management software enables customization without coding. Avatier transforms operations by reducing support requests and providing optimum IT security. Avatier is the only company offering IT self-service administration capabilities targeting the business user and adaptable to the needs of an organization. Our advanced connectors make IT risk management and compliance possible using a fraction of resources to make it happen.