<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

The Bastion secures your applications with AAPM

› › › BACK TO THE BLOG

[fa icon="calendar"] May 11, 2017 12:30:17 PM / by Eric Gaudin

The WALLIX Bastion offers AAPM (application-to-application password management) with a fingerprinting proprietary technology to authenticate third party applications.

 

application-to-application-password-management-aapm.jpeg

What is AAPM?

Several applications of your IT infrastructure require to connect to other applications to process theirs services. As for users that have to authenticate to a server to access its services, those applications have also to authenticate to those servers.

A well-known problematic is to allow a server for example a ticketing server such as Redmine to authenticate with a directory service (AD). Once the server Redmine is authenticated, it can validate by using the AD connection, the identity of users wishing to access to its services. This way, AD accounts are not duplicated and the overall authentication of your users is centralized.

 

The problem AAPM solves

Today, credentials used from an application to connect to another application are stored within a flat configuration file, most of the time, in clear (…). AAPM purpose is to eliminate these kind of files as well as hard coded password that can exist in applications, and to propose a secured mechanism to authenticate an application with another application.

As of now, the WALLIX Bastion offers AAPM with a fingerprinting proprietary technology to authenticate third party applications.

 

Contact us for more information or visit our website at www.wallix.com

 

Topics: Wallix Products

Eric Gaudin

Written by Eric Gaudin

Overseeing privileged access to your vital infrastructure, Product Marketing, WALLIX

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security