Collapse & Return to Top
By providing authentication and authorization for endpoints accessing the network edge, 3Com Intelligent Management Center (IMC) User Authentication Management (UAM) reduces vulnerabilities and security breaches. As a component of the IMC management platform, UAM supports access policies across a variety of access devices such as Ethernet switches, routers, broadband access servers and VPN access gateways to centrally manage access for wired, wireless, and remote users. UAM and other components of IMC can together implement integrated management of users, resources and services.
IMC UAM provides a full-featured Remote Authentication Dial-In User Service (RADIUS) server that supports centralized Authentication, Authorization and Accounting (AAA) management of endpoints that connect and use network services. Policy management provides access control with tiered privilege levels.
Realms can be created within IMC UAM to authenticate user names and passwords against distributed UAM databases. This provides authentication redundancy, increasing security and enabling the authentication of roaming users. IMC UAM provides flexible authorization policies to dictate access by defining access policies for individual users, devices and groups. Additionally, policies provide the ability to control access by location and time of day.
As a component of IMC, UAM provides advanced reporting capabilities through its centralized, webbased management console, enabling network administrators to quickly scan the activity and status of all devices currently or historically connected to the network. Reports may be used for real-time analysis, historical analysis, compliance auditing and troubleshooting.
By solving critical challenges at the time of deployment and improving the operational efficiency of network endpoints, IMC UAM provides an essential tool for security, risk avoidance and ongoing operational efficiency.