Check out our special report on Cybersecurity
HID PIV IDMS multi-factor authentication solution
Technical Specification
- Make: HID
- Model code: PIV IDMS
- Photo ID: Yes
- Visitor Management: Yes
- Central / Remote Monitoring: Yes
HID PIV (Personal Identity Verification) IDMS (Identity Management System) delivers a comprehensive, highly configurable solution to perform identity proofing, enrollment, and credential issuance – even to remote users. Key Features Manage and track identity proofing lifecycle – Customisable, automated workflows to ensure secure credentials are issued to the right person Connect to external background check systems - look up and compile criminal records, commercial records and financial records Enforce separation of duties – Maximise the security in the credential production process Centralize identification attributes – Including photo, fingerprints, identity documents and background check results Convenient self-service issuance – Easy to use activation for remote users Comply with standards and mandates – Support PIV & PIV-I, NIST Identity Assurance and more
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control software |
| Model code | PIV IDMS |
| Photo ID | Yes |
| Visitor Management | Yes |
| Central / Remote Monitoring | Yes |
| System Requirements |
Operating System: Microsoft Windows Server 2008 R2 / 2012 / 2012 R2 / 2016 Web Browser: Chrome, FireFox , Internet Explorer 11+ |
| Additional info |
HID PIV (Personal Identity Verification) IDMS (Identity Management System) delivers a comprehensive, highly configurable solution to perform identity proofing, enrollment, and credential issuance – even to remote users. Key Features
|
More HID Access control software
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control controllers
Related Whitepapers
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
6 good reasons to embrace mobile credentialing
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download