RSA SecureID/IDPlus: This is replacing Okta for Single Sign-On and Multi-Factor Authentication. It's the main change employees and students will notice or be affected by.
-
Enhanced Security with Ease of Use: RSA SecureID/IDPlus offers strong security with minimal effort. It uses advanced protection, like phishing-resistant authentication and secure access, to safeguard TSTC and work data—without adding complexity to your daily tasks.
-
Password-less and Phishing-Resistant: No need to create or remember passwords anymore! With the RSA Authenticator app or hardware authenticator (a secure, portable device), you can use passkeys to set up your account. This simplifies the login process and, without passwords, phishing scams are no longer a threat. Your account stays secure, and logging in becomes faster and easier.
-
Self-Service Control: You can manage your account settings, like changing your password or switching to password-less authentication, without having to contact OIT support. Meanwhile, RSA’s system helps administrators maintain security and efficiency behind the scenes.
-
Boost Productivity: Quicker, easier logins mean you can spend less time on login screens and more time getting things done.
RSA Identity Governance & Lifecycle (IGL): This is primarily an internal tool for managing users and permissions, playing a crucial role in enhancing our cybersecurity efforts. It will streamline processes for OIT by improving onboarding/off-boarding procedures and providing better control and visibility into access and privileges across our platforms. Additionally, it will benefit HR with smoother pre-hire and onboarding processes and simplify the registration / enrollment process for new students.
-
Role-Based Access Control (RBAC): IGL uses RBAC to assign access rights based on an individual's role within the organization. As roles change—such as through promotions or transfers—the system automatically adjusts access privileges to ensure they align with the user's current responsibilities.
-
Provisioning and Deprovisioning: Once access is approved, IGL automates the provisioning process, which includes creating accounts, assigning roles, and granting permissions. When an employee leaves, the deprovisioning workflow ensures timely revocation of access.
-
Access Reviews and Certification: IGL regularly initiates access reviews, prompting managers or system owners to confirm whether users still need the access they have. This prevents "privilege creep" (when users gain unnecessary access over time) and helps maintain regulatory compliance with standards such as GDPR and SOX.
-
Audit and Compliance Reporting: IGL tracks all access requests, approvals, and changes, providing a detailed audit trail. This helps organizations meet regulatory requirements and internal policies, and it allows for automated reports that show who granted access, when, and how it aligns with the user’s role, simplifying support for internal audits.
-
Real-Time Usage Insights: The IGL dashboard offers real-time analytics on user activities, authentication attempts, and access patterns, enabling efficient monitoring by admins.
-
Identity Threat Detection: Using advanced machine learning, the system detects unusual behavior patterns that may indicate identity threats or security breaches, allowing for timely responses.
-
Enhanced Visibility into Attacks: The dashboard highlights potential cyber-attack vectors and suspicious activities, enabling proactive measures to address them.