With a multitude of systems and regulations that change at short notice, there are currently various places and ways to manage authorizations. Central and up-to-date Physical Identity and Access Management (PIAM) lifts users to a level of modern efficiency and security.

Since 24.11.2021, the 3G rule has been in force at the workplace, and employers are responsible for compliance. If you don’t want to waste precious working time, you need central, up-to-date identity management – and not just during the pandemic.

Modern steering systems are the domain of thyssenkrupp Presta AG, Lichtenstein. For precise control of modern vehicles, a large number of system components must match precisely – just as is indispensable for central identity management. Here, the evolutionID team thought a step further and found the best combination of RFID and PKI (2FA).

Springs and stabilizers form the basis for safe, efficient and comfortable mobility – from sports cars and limousines to trucks. thyssenkrupp Springs & Stabilizers stands for innovation and high-tech in chassis technology worldwide – and fares well with centralized identity management from evolutionID

Our modern RFID analysis tool, which supports over 50 technologies, has been upgraded with the MTSC management functionality. As a part of the TAG-Analyzer, MTSC is a unique and holistic solution that provides you sovereignty over the creation of the LEGIC® Master Tokens.

A small village dairy farm, founded in 1896 in Aretsried, Bavaria, has become a globally active company: Innovative product policies, high quality standards and clever marketing have made the Theo Müller Group a force to be reckoned with in the food industry.

Spanish supermarket chain Dinosol and industry-leading scale manufacturer Bizerba rely on contemporary contactless RFID technology from evolutionID and RFID readers from Elatec for secure employee login at POS devices.

The Corona pandemic has further strengthened the long-standing trend toward home offices and shared desks. Dedicated workstations and compulsory presence will soon be a thing of the past. This saves costs and protects the environment. However, the shared office needs to be well organized and secured. A flexible digital identity can help.

Working from home is booming: For infection control reasons in particular, home offices were even compulsory1 in Germany for a time. However, this regulation was by no means inconvenient for the majority of employees: In a study by IBM, 75 percent of those surveyed said they wanted to work at home at least occasionally, and 54 percent would even like to relocate their office to a home office for the most part.2  In any case, the environment benefits from the new trend, because fewer trips to work also mean fewer CO2 emissions.

Employers also welcome the new trend, as it brings tangible cost benefits when combined with flexible office space concepts. In the shared desk office, there are no longer any permanently assigned workstations and therefore no deserted areas whose users are on vacation, on a business trip, on training, sick or even in the home office. Office chairs and desks are constantly reassigned as needed. Around one in five people already work this way, and no negative effects on motivation or well-being have been observed.

However, the new office concept requires sophisticated building technology and forward-looking, networked resource planning. If the space required is calculated too generously, the cost savings will be reduced; if too little space is calculated, not everyone who wants to work in the company office will be able to find a place there. Access control also needs to be tailored to the shared desk concept. That’s because as workstation assignments keep changing, social control diffuses toward people outside the company. The constantly changing conditions prevent a permanently optimal configuration. The system must constantly adapt. If identity management is distributed over several instances, this can quickly become a burden for personnel, office and security management.

evolutionID offers the appropriate answers to the challenges of the shared desk age. This already starts with the booking of the workstation via an IDfunction process: Those who want to work in the company can conveniently reserve a seat online with their browser and receive a confirmation email. This prevents overcrowding, and the booking figures can be used to calculate exactly how many workstations are really required.

From the information stored in the digital identity, the allocation system can directly deduce whether, for example, a workstation suitable for the disabled is required or whether the employee needs a garage parking space. A locker can also be provided on a temporary or permanent basis, which the employee can conveniently open with his or her company ID card. Of course, access to the office is then also open – and only in the areas that the respective employee really needs and only at the times when he is registered and logged in. These application examples could be continued at will.

Every time the company office is used, a large number of systems are involved. However, there is no need to fear a Babylonian confusion of data and rights in modern systems. This is because the booking system, locker, access control and all other authorization-relevant systems access one and the same digital identity. If an employee loses his or her company ID or leaves the company, all issued authorizations can be revoked with a single mouse click.

Of course, dynamic workstation assignment with its accompanying functions is just one example of the complex uses of digital identities – and the potential of IDfunction. At evolutionID, we always configure and customize our product so that it integrates into the customer’s IT and HR landscape. Because our conviction is: The software has to adapt to the business – not the other way round.

Whoever creates clear conditions saves unnecessary additional work – not only in the shared desk office.


1Quelle: Juris.de | 2Quelle: IBM | 3Quelle: Fraunhofer Institut

EvolutionID GmbH is very pleased to announce a new partnership with Versasec. The Versasec team brings PKI security and Full Lifecycle Identity and Access Management (IAM) to evolutionID’s intelligent ID management systems, including cards and key fobs.

Versasec is the leading provider of highly secure, passwordless, state-of-the-art identity and access management solutions. With its flagship product vSEC: CMS, Versasec makes it easy for companies of all sizes to provide physical and virtual smart cards. Versasec’s solutions enable its customers to authenticate, issue and manage user credentials more securely than any other solution on the market.

You can read more details about the partnership and the resulting advantages for our customers on Versasec.com

 

Access to the company, one’s own locker or access to a network drive: For each employee, a large number of authorizations and accesses have to be assigned – on a wide variety of systems. A central ID management system makes this much quicker and easier.

From a security point of view, the integration of the new employee into the company takes a real all-rounder in many conventional IT environments. He or she must know how to operate the PACS user interface, be familiar with license plate recognition in the parking garage, and of course with the central Active Directory structure of the entire company. But who do I have to notify again so that the new person is handed their notebook on the very first day? We have a list like that somewhere…

Heterogeneous structures

Particularly in large companies, the system landscape is often – let’s say – an evolved infrastructure. There are many different systems, with just as many different user interfaces. And their operation is often reminiscent of the IT days before the introduction of the computer mouse; it was not the document itself that was called up in those days, but first the program responsible for processing it. And in a similar way, HR and security management has to work their way through the entire system landscape each time in order to assign a person the authorizations he or she needs.

That’s why we’ve designed IDfunction, the results-oriented solution.  Specific authorizations can be assigned to each person simply by clicking the mouse. This works consistently in a web interface on a wide variety of end devices. For example, if you want to grant access to the second floor between 9:00 and 18:00, you don’t need to know which system is in use there. All necessary parameters are stored in IDfunction so that the user doesn’t need to worry about it anymore. The same applies to the assignment of objects, notebooks or cars. Even if individual security systems are changed or replaced, the HR employee always sees only the familiar and functional user interface. In this case, only the integration is updated.

Automatic notifications

Just like the assignment of authorizations, the notification system is largely automated and freely configurable. When an access authorization is reassigned or revoked, an automatic notification is sent to the user. If the parking space is assigned to him, IDfunction automatically prompts him to provide his license plate number so that the license plate recognition system will let him into the company garage on the very first day. If he receives a company notebook, IDfunction instantly informs support when and where to provide the device.

Such an automated system can also react much faster to security threats: If a badge is lost, all authorizations can be blocked with just one click. IDfunction ensures that not a single unauthorized access remains even in the furthest corner of the company EDP.

Last but not least, this enables targeted hygiene and pandemic management: if incidences increase, for example, access authorizations can be reconfigured so that employees encounter each other as little as possible. The notification system then informs everyone affected that from Monday, for example, they will only be allowed to enter the plant premises via Gate 2 between 9:00 and 9:30. In this way, hygiene concepts can be implemented quickly and reliably – without anyone standing unexpectedly in front of a locked door.

Individual customization

An identity management system provides a central solution for managing authorizations in a wide variety of systems.

We have consistently implemented this principle in IDfunction: intuitive in operation, functional in the application. We achieve maximum efficiency through cross-system integration. As a service provider, we customize IDfunction according to your individual requirements – across all system boundaries.