A complete and
reliable solution
for the world of
Education

is the answer to the needs that mid-size to large universities have for the daily management of accounts, permissions and compliance to the main privacy and access regulations.

landing_img1.svg
Centralized
management
From a single console you can manage the full lifecycle of accounts owned by professors, students, technical staff and visitors, with control over access permissions to all resources owned by the university.
education_def_img_1.png
Auhtoritative
systems synchronization
The process of user enablement will not be subject to manual actions, pointlessly long and tedious. With our solution all the data from auhoritative systems (company HR, for example) will be automatically distributed across the target applications according to specific business rules, so that each user is operational in the shortest time possible.
education_def_img_2.svg
Automated
provisioning
Creating, disabling and optionally removing user accounts onto various systems as Active Directory, LDAPv3 systems, time-tracking, physical access management devices, etc. will not be requiring manual actions, subject to inevitable human errors. With our solution it will be possible to automate such operations by simply defininig specific business rules that appropriate software components will enforce.
Permissions
Finding and defining access permissions to resources is often a long, difficult process. Thanks to our solution it will be possible to define once for all the specific business rules to process user roles and to automatically define access permissions to logic and physical resources as labs, parking areas and libraries.
education_def_img_3.png
Physical access
Today our solution gives the chance to control from a single point all accesses to both logical and physical resources as parking areas, labs, reserved / danger areas, and libraries. This control is enforced through generation and propagation of specific access rules onto hardware and software systems responsible for such checks.
cerchio1 cerchio2 cerchio3 cerchio4 cerchio5 cerchio6 impronta luce
Credentials
generation
With our solution it is possible to generate and assign to users logical credentials (as traditional username and password) but also physical credentials as RFID tags. The system could be in fact configured to remotely interact with hardware and software systems for tag issuance with purpose of centrally manage whatever credential type.
  • card
  • card
  • card
  • card
  • card
  • card
  • card
  • card
  • card
  • card
Discover all
other features
pointercard
  • Single Sign-On (SSO)

    Managing credentials and permissions is becoming increasingly difficult due to the proliferation of new applications. Our solution allows to configure, in a single point, access control in order to allow the validation of the most different types of user credentials, and single sign-on access to the various web applications available.

  • Federation

    Adopting our solution quickly allows, thanks to supported standards as OpenID Connect, OAuth 2.0 and SAML 2.0, to federate with other organizations in order to provide services to external users pertaining to organizations with which a reciprocal trusted relationship exists.

Want to see
the software
in action?
Try our demo and discover how easy identity and access management can be
Access to the base demo
we have prepared for you.
Contact one of our consultants and obtain a demo designed for your needs.
You will be guided by a developer to quickly understand product capabilities, or you could ask for tailored features.
We have solved complex problems in a simple way
Read the stories of who did already choose Tirasa for digital identities
Developed with
immagine opensource
Open Source Software
Benefits and Regulations
All around the world, Open Source software is strongly recommended - when not mandatory choice - for Public Administration, when it comes to acquisition and reuse of software.
As an example, the Open Source Observatory and Repository (OSOR) is a project launched by the European Commission for exchanging information, experiences and best practices around open source solutions for use in public administrations.
This happens because open source software is recognized as inherently robust and secure, and preserves by nature its adopters from vendor lock-in.
In this perspective we can not but play a leading role.
The philosophy that guides our company in its daily operating choices, the care and the ways in which it creates solutions for its customers as well as the total absence of proprietary licenses make Tirasa the "virtuous" supplier for Public Administration.