Unified Identity Authentication Management Platform UniIAM

Building a Unified Digital Identity System for Enterprises and Enabling a New Era of Business Intelligence

Product Overview

UniIAM, developed by Leagsoft, is a comprehensive identity security platform that combines account management, authentication, access control, auditing, and application management in one solution. It offers key features like a unified authentication portal, Single Sign-On (SSO), Multi-Factor Authentication (MFA), password security, and identity governance.

By integrating with both upstream and downstream systems, UniIAM automates the entire lifecycle of employee accounts—from onboarding and role changes to offboarding. This ensures efficient management while significantly reducing security risks associated with account handling. With UniIAM, an organization’s identity security status is displayed on a digital identity dashboard, providing clear visibility and control throughout the business. This solution helps establish standardized protocols for identity management and application integration at an enterprise level.

UniIAM strengthens your organization’s identity security and serves as the foundation for a Zero Trust security model. It’s a critical component in any digital transformation and essential for building a robust information security infrastructure.

Key Capabilities

Advantages

Identity Security Gateway
UniIAM supports a wide range of authentication protocols, including LDAP, Radius, SAML, OpenID Connect (OIDC), OAuth 2.0, CAS, and more, facilitating protocol conversions to minimize the development effort required for business integration. It also provides essential security features such as core identity source protection, unified authentication, auditing, and attack prevention.
ITDR Identity Security Detection and Response
By integrating with identity authentication infrastructure to enforce blocking rules, UniIAM supports both manual and automated threat blocking, ensuring the security of identity infrastructure. It is ideal for scenarios such as compliance audits, daily operations, network defense, red-blue team exercises, ransomware protection, and disaster recovery, offering comprehensive protection for enterprise security.
Digital Security Foundation for Native Security
The native security digital foundation empowers third-party business applications, building an identity-centric digital security workspace that enables Zero Trust access. This significantly reduces the risk of enterprise data breaches.
Microservices Architecture with Multi-Network Support
Built on a microservices architecture, UniIAM’s platform is modular, allowing each backend service to scale horizontally based on real-world application needs, ensuring top-tier reliability. It supports complex network deployment scenarios, including multi-site, three-center deployments, hybrid cloud architecture, and network segmentation.
Continuous Adaptive Trust (CAT)
With continuous trust evaluation and dynamic access control capabilities, UniIAM encrypts, authenticates, and enforces authorization on all access requests by default. It continuously evaluates trust levels based on aggregated data from various sources, dynamically adjusting permissions according to the assessed trust, ultimately establishing a fluid, adaptive trust relationship.

Key Benefits

  • Building a Digital Identity System to Accelerate Business Flow

    By establishing a unified digital identity framework, UniIAM creates a standardized identity model that ensures seamless connectivity and data interoperability through an "Identity Middle Platform." This integration accelerates business processes and significantly enhances overall enterprise efficiency.

  • Building a Digital Intelligence Ecosystem to Enhance Management Capabilities

    By integrating internal and external enterprise applications, UniIAM fosters the development of an intelligent ecosystem that strengthens management capabilities. This empowers organizations to drive new economic models by creating a closed-loop of data, identity, and business processes, improving overall efficiency.

  • Zero Trust-Driven Security Loop

    Leveraging Leagsoft’s UniIAM as a foundation, a Zero Trust security architecture is implemented to create an intelligent security ecosystem. This approach ensures comprehensive Zero Trust security across the network, empowering the security of digital transformation initiatives.

  • Full-Stack Trust Ecosystem Integration

    UniIAM fully integrates with China’s trusted and secure ecosystem (Xinchuang), creating a secure and autonomous enterprise identity infrastructure that is both controllable and resilient.

  • Driving Industrial Upgrades

    Digital transformation drives the integration of intelligent ecosystems, reshaping business models, and fostering intelligent operations and services. This transformation provides a powerful catalyst for industrial upgrades and sustainable growth.

Business Scenarios

Employee Account Lifecycle Management
Challenge: Employee role changes often require manual updates to application accounts and permissions, leading to high maintenance volume, increased risk of errors, and potential data security vulnerabilities.
Solution: UniIAM automates the entire employee account lifecycle, integrating with upstream and downstream identity sources and applications. This ensures seamless account creation, permission adjustments, and account deactivation, while synchronizing account information across all connected systems, reducing manual effort and minimizing security risks.
Unified Authentication and Single Sign-On (SSO)
Challenge: Frequent system logins across multiple platforms disrupt workflow and reduce productivity.
Solution: UniIAM provides a unified authentication and Single Sign-On (SSO) solution, integrating multiple business systems into a single portal. With one set of credentials, users can easily access all systems, eliminating login barriers. Employees can share a personal workspace, streamlining task management, notifications, and communications. This simplifies the login process, boosts productivity, and enhances security, creating a more efficient and secure work environment.
Unified Access Control and Continuous Dynamic Evaluation
Challenge: As businesses increasingly require more complex and stringent access management across users, devices, and services, there is a growing need for a granular, dynamic, and flexible access control model.
Solution: UniIAM uses RBAC (Role-Based Access Control) and ABAC (Attribute-Based Access Control) models to provide unified access governance. During user interactions with business systems, UniIAM continuously evaluates trust levels and dynamically adjusts permissions, establishing a fluid trust relationship to ensure secure and flexible access management.
Enterprise-Wide Zero Trust Security
Challenge: As the number of information systems grows, managing complex and fragmented user identity data becomes increasingly difficult, making unified control and oversight a challenge. There is a need for comprehensive risk management throughout the authentication and authorization process to build a Zero Trust security framework across the enterprise network.
Solution: UniIAM’s digital identity security foundation empowers enterprises in their digital transformation journey by integrating identity and endpoint security. Built on IAM (Identity and Access Management), this platform covers a range of capabilities, including SDP (Software-Defined Perimeter), micro-segmentation, application-level security workspaces, intrusion protection, and business transaction analysis, all in one unified solution.