Home > Products > Bloombase Identity

Bloombase Identity - Enterprise Strong Identity and Access Governance

Overview | Specifications | Resources

Technical Specifications

 

Bloombase Identity Manager provides all-in-one secure, automated and policy-based solution for managing roles, identities and access rights spanning heterogeneous IT resources in your complex organizational IT environment.

Download Specifications

You need Adobe Acrobat Reader to read our digital product brochure.


User Management

  • Local user management
  • Remote user association management

User Authentication

  • Simple authentication
  • RADIUS authentication
  • Two factor authentication
  • One time password authentication
  • Public key infrastructure (PKI) based authentication

Simple Authentication

  • Microsoft Active Directory (MSAD)
  • Lightweight Directory Access Protocol (LDAP)
  • Relational databases (RDB)

Device Management

  • Smart card/token key generation
  • Smart card/token key management
  • Smart card/token pin change
  • Smart card/token pin unblock
  • OTP device initialization
  • OTP device synchronization

One Time Password Device Support

  • OATH-compliant HMAC-based OTP (HOTP) hardware tokens
  • OATH-compliant HMAC-based OTP (HOTP) software tokens
  • OATH-compliant time-based OTP (TOTP) hardware tokens
  • OATH-compliant time-based OTP (TOTP) software tokens

Delivery Profile Support

  • Simple Mail Transfer Protocol (SMTP) email
  • IBM Lotus Domino messaging
  • Short Message Service Center (SMSC) protocol
  • HTTP POST and GET

Security

  • NIST FIPS 197 AES encryption and decryption (NIST certificate #1041)
  • RSA public key cryptography (NIST certificate #496)
  • SHA-1, SHA-256, SHA-384, SHA-512 hash generation (NIST certificate #991)
  • Proven keyed-hash message authentication code generation (NIST certificate #583)
  • Japan NTT/Mitsubishi Camellia encryption and decryption
  • Chinese National SCB2(SM1), SSF33, SSF28 encryption and decryption
  • Korean Data Encryption Standard (SEED) and ARIA block ciphers
  • NIST FIPS 46-3 3DES and DES encryption and decryption
  • RC2, RC4, RC5 and RC6 encryption and decryption
  • CAST5 encryption and decryption
  • Twofish and Blowfish encryption and decryption
  • IDEA encryption and decryption
  • Serpent and Skipjack encryption and decryption
  • DSA public key cryptography
  • MD5 and Chinese National SCH(SM3) hash generation
  • Pluggable cipher architecture for future cipher upgrade or custom cipher support
  • Hardware ASIC cryptographic acceleration (optional)

Accreditations and Certification

  • NIST FIPS 140-2 compliant Bloombase Cryptographic Module
  • Ministry of Public Security validated security product

Client Connectivity

  • RADIUS
  • RESTful Bloombase Identity Manager API

Application Programming Interface

  • RESTful Bloombase Identity Manager API to send and receive identity information
  • HTTPS security and authentication
  • Plain text simple input/output
  • JSON (JavaScript Object Notation) light-weight structured input/output
  • XML generic structured input/output

Management

  • Web based management console
  • Central administration and configuration
  • User security
  • Serial console
  • SNMP v1, v2c, v3
  • syslog, auto log rotation and auto archive
  • Heartbeat and keep alive

Disaster Recovery

  • Configurations backup and restore
  • FIPS-140 hardware security module recovery key or software recovery key vault for settings restoration
  • Customer-defined recovery quorum (e.g. 2 of 5)
  • FIPS-140 hardware security module operator key or operator pin for daily Bloombase KeyCastle operation
  • High-availability option for active-active or active-standby operation
  • Stateless active-standby failover

Platform Support

  • Bloombase OS

Hardware Support

  • i386-base architecture
  • AMD 32 and 64 architecture
  • Intel Itanium-2 architecture
  • IBM Power6 architecture
  • PA-RISC architecture
  • SPARC architecture

The specification and outlook of the model may vary and is for reference only


Secure Your Data Now

Protect your data with Bloombase transparent encryption.

Bloombase Demonstrations

See how Bloombase protects your digital assets.

Bloombase SupPortal

Get technical support from Bloombase Supportal and Knowledgebase.