Click here to sign up for our mailing list
Hello and welcome to this HelloID Access Management product release video for July 2020.
HelloID Access Management is an cloud based solution to control who has access to your business applications. By offering Single Sign On, access will made easier for the end user. HelloID also offers a wide integration with many two and multi factor devices, like Yubikey, Soft token, Oauth tokens, SMS, Radius, and many more. HelloID is an good alternative for ADFS, Okta, One Login and Azure P1 license.
In this video I first I’d like to start with a PowerPoint presentation and then demo you the new functionalities.
We have nine new items in this release. The first is an extra option in the admin portal where you can see the status of the configured certificate with the expiration date. This is in combination with the functionality that was released in June which was an email notification when a certificate is about to expire. With this option you can see the actual status of the certificate.
We also have an extra hidden attribute ECK-ID. It is in the user database but not visible in the GUI. It is only accessible via the mapper and the API.
We also have an extra Token management role, now you can delegate 2FA tasks to a non-technical user without granting them full admin access to all the HelloID portal.
Other additions are three new reports: ‘failed logins’, ‘application usage’, and ‘most active users’ and we also added the option to add a custom text on the login page and you can use this for every IDP you have available.
Another new item is an extra addition to the OpenID SSO so that you have multiple redirect URLs. The last new item is that we have the ability to change the default security role.
Manage certificates in the admin portal
The first thing I’d like to show you is how to manage certificates in the admin portal. That is part of the settings, where you have ‘certificates’ and within that you have a new option where you can show certificates in the different applications, IDPs and custom portals. This is the line including the expiration date. If this dates expires you will be informed by an email notification. We added this feature last month.
Extra hidden attribute ECK-ID
The next item is the extra hidden attribute, I can show it here for the administrator. Here you can see the default attributes but also the extended attributes and the ECK-ID is not visible in the user interface. However, if I retrieve the information via the API for the administrator, you can see here that the attribute is available, so it is available for the API.
Token management role
Another change is the token management role, so now you have the option to delegate two factor management to non-admin users. So if I select edit here, for example, there’s an extra permission available, and that’s manage second factors, and it has two options: to manage and to configure. Manage is for this section, so you can manage your second factors, and Configure is for token import management, so you can easily give a non-technical user only access to this screen and all the other options will not be available.
We also have a couple of new reports. The first is failed logins, here you can see at what time, from which platform a user failed to login. Another one is the application usage, here you can see what applications have been used and also on a unique basis, this count is unique per user, and the third new report is that we can also see the most active users using the applications within the platform, so that’s the information visible here.
Customize login page
Another new options is the ability to customize the login page. This is an additional message and you can put that on every IDP login page. This is the place where you can change that, it’s in the identity provider sections, here’s the one for Local which is what I just showed you, and this is the message that was shown here. Of course I can make that available for any identity provider, so, for example, if I want to put a bit more explanation on the active directory, I can turn this on and say ‘welcome to enjoi’. You can make any modification you like.
Change default security role
The last thing I’d like to show you is that you can change the default security role. These are all the security roles and this is the default user role, this used to be not editable, now you can edit it and turn the default role on and off.
This is the end of this video. Thank you for your time and attention.
Please let us know if you have any additional questions. You can post your question in youtube or send it to firstname.lastname@example.org. Please subscribe to our channel to receive frequent updates about improvements and changes in HelloID.
For now have a wonderful day.