Lieberman RED – Rapid Enterprise Defense Identity Management continuously secures embedded passwords in web application tiers, packaged software programs, line-of-business applications, custom programs and more. It automatically changes embedded passwords according to rules that you define for complexity and change frequency. It then synchronizes the changes across interdependent tiers to prevent lockouts and service disruptions.
RED Identity Management synchronizes changes across your application tiers in these ways:
- SDK and Orchestration APIs, included at no additional cost, for securing passwords embedded in applications, scripts and other locations across multiple platforms. Applications call the SDK when needed to retrieve current credential information programmatically, over an encrypted connection, from RED Identity Management’s secure data store. The SDK and orchestration APIs also enable newly-deployed, as well as remote and offline, systems running your applications to register programmatically with RED Identity Management. This enables you to enforce password security policies immediately upon deployment of your new systems.
The SDK is provided in multiple formats including Web Services provided as SOAP/WSDL and REST/JSON, as well as PowerShell. It runs only when needed to enable client access. It supports PKI, integrated authentication, and other methods to operate with virtually any authentication environment, extensible program or programming language.
RED Identity Management provides for many programmatic methods to update or replace passwords in a myriad of locations. Many of these locations, including hard-coded passwords, are handled by the String Replacement in Files and Run Arbitrary Process to Find/Update Credentials propagations.
- Automatic string replacement with custom propagation to secure passwords according to your policies for complexity, uniqueness and change frequency in application files – including database configuration files, web.config, compiled binary files and others.
- Launching arbitrary processes to find and update credentials – executing both your custom processes and scripts supplied by you and/or third-party software vendors to update credentials according to your security policies.
Because RED Identity Management issues application credentials programmatically and enrolls new assets immediately, you’ll avoid service lockouts while closing a significant security hole on your network by virtue of your newly enhanced security posture.
Contact us today to learn more about how Lieberman Software can secure your application credentials.