Check out our special report on casino security
HID SecureLogin Single Sign-On password management software
Technical Specification
- Make: HID
- Model code: SecureLogin Single Sign-On
- Reader Types: Smart Card
- Integration: ActivClient®, ActivID® Card Management System, 4TRESS® AAA Server for Remote Access
- Central / Remote Monitoring: Yes
The HID SecureLogin Single Sign-On minimises repetitious password entry and reduces IT help desk costs by providing a secure, automated method to access multiple applications via a single login credential. It allows organizations to automatically generate complex passwords that are less susceptible to theft, guessing and brute-force dictionary attacks than static, user-generated passwords.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control software |
| Model code | SecureLogin Single Sign-On |
| Reader Types | Smart Card |
| Integration | ActivClient®, ActivID® Card Management System, 4TRESS® AAA Server for Remote Access |
| Central / Remote Monitoring | Yes |
| Web-enabled software | Yes |
| System Requirements |
Operating System: Microsoft Windows 2000 Workstation, Windows XP, Windows Vista, Windows 7, Windows Server 2000, Windows Server 2003, Windows Server 2008 Web Browser: Microsoft Internet Explorer 6.0, 7.0, 8.0 or 9.0, Mozilla Firefox 2.0 |
| Additional info | The HID SecureLogin Single Sign-On minimises repetitious password entry and reduces IT help desk costs by providing a secure, automated method to access multiple applications via a single login credential. It allows organizations to automatically generate complex passwords that are less susceptible to theft, guessing and brute-force dictionary attacks than static, user-generated passwords. |
More HID Access control software
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control controllers
Related Whitepapers
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
6 good reasons to embrace mobile credentialing
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
