Your digital reception
Access management (AM) is the gateway for users to your services. It takes care of secure logins to all services, user rights evaluation and consistent access auditing. Figuratively speaking, it is a digital reception of your company. It is often the very first thing users see, and customers form a key first impression based on its quality and organisation. A well-implemented AM will therefore ensure that users feel welcome and your service feels trustworthy and secure.

The building blocks of Access Management
Access Management extends beyond Single Sign-On (SSO), encompassing an entire ecosystem that assesses system policies. It includes also directory services or an access gateway, facilitating service integration with minimal disruption to applications.
ACCESS CONTROL
- Authentication incl. MFA
- Authorization
- Federations
- Entitlements
- OAuth2, OIDC
- Single Sign-On
- Web Services Security
- Session management
DIRECTORY SERVICES
- LDAPv3
- Password policies
- Access Control
- Groups
- Replication, high availability
- Monitoring
- Audit
- LdapSync
ACCESS GATE
- Application Security and SSO
- API protection
- Oauth2/OIDC a SAML
- Proxy
- Transcription (HTTP) requests and responses
Authenticate users according to your rules
Guaranteed security and high availability
SSO in line with your corporate identity
Reliable integration environment for your suppliers
Easy integration with identity management
Compliance with mandatory regulations
Why Orchitech?
What makes our approach unique
Whether you are a small business or a global corporation, Orchitech delivers comprehensive, flexible, and scalable solutions tailored to meet your specific needs. Not only do we offer cutting-edge access management solutions, but our portfolio includes a wide range of related services, from identity management and directory services (LDAP) to single sign-on (SSO) to DevOps.
We deliver solutions with thorough analysis and a commitment to error-free performance. This is aided by rigorous configuration management, behavioral testing and aftercare in the form of preventive maintenance.
Feasibility study
Our first step is always a comprehensive analysis of your existing systems, processes, and specific needs. This allows us to suggest an optimal solution tailored to meet your requirements, outlining a detailed implementation plan.
Complex access management projects
We will prepare a suitable solution and guide you through the entire process of implementing or migrating from a non-compliant solution. Deploying information systems is a sensitive process – we will ensure that access management does not throw you any unpleasant surprises during the transition to production.
Our go-to solution is generally Wren:AM. However, we can customize a solution to your needs, for instance, using CAS or cloud services.
Maintenance and support
Reliable operation, prompt troubleshooting, and constant functional checks of all systems. This ensures your peace of mind, knowing that all components are functioning as intended, without you needing to concern yourself with the intricacies of the operation.
Other services within Access Management
Access management is a broad topic, and we also address specific topics such as:
Identity federations
Providers such as NIA and eduID, allow you to integrate identity resources outside your organization. NIA is primarily known from eGovernment and eduID allows students to log into systems across public universities. Federations are also used among affiliated organizations, such as an insurance company and its parent bank.
Multi-channbel infrastructure
AM supports different communication/sales channels and different types of users at once, typically such as clients and sales representatives.
LdapSync
In situations where information is dispersed across multiple directory services, synchronization becomes essential. We’ve developed LdapSync to streamline this process, specifically in scenarios requiring technical synchronization of data at the repository level.
Taking over legacy OpenAM / OpenSSO projects
Despite no longer receiving support, these once-popular open-source systems are still operational in many productions. We offer their migration to the technologically related Wren:AM system with subsequent support and maintenance.
From our blog
Wren Security: the modern alternative to OpenAM, OpenIDM, OpenDJ
Wren Security products as an alternative to the well-known OpenAM, OpenIDM a OpenDJ products – originally open-source projects from ForgeRock
Why consider Zero Trust
Zero Trust is a security model that assumes every access to a network, application, or data storage must be verified and authorized.