We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Authentication Appliance.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Authentication Appliance - List of Manufacturers, Suppliers, Companies and Products

Authentication Appliance Product List

1~4 item / All 4 items

Displayed results

[Security] Authentication Appliance "Account Adapter Plus"

Approval, account management, DHCP, and appliances! Up to 200,000 accounts can be registered.

"Account Adapter Plus" is an authentication appliance server that condenses the know-how necessary for network authentication. It features a unique application workflow and account management that accepts connection requests, making it easy to authenticate users and devices connecting to the network and control access, thereby reducing management and operational burdens. It can register up to 200,000 accounts. 【Account Management Features】 ■ Up to 200,000 accounts can be registered ■ Automatically deletes unused accounts ■ Automatically imports account information from external systems ■ Automatic collection of MAC addresses ■ Modification and deletion of accounts from external systems via LDAP bind *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Network authentication appliance "iBAQS-FX"

Achieve secure network access from wired and wireless LAN to VPN!

The "iBAQS-FX" is a RADIUS authentication server that supports various authentication patterns. It switches modes according to the implementation phase. In MAC collection mode, it automatically collects the MAC addresses of devices connected to the existing network and allows for bulk registration, leading to cost reduction. It is possible to quickly identify where unauthorized access occurred, enabling prompt response. 【Features】 ■ Cost reduction through phased implementation from MAC collection mode ■ Diverse authentication methods such as one-time passwords ■ Early resolution by identifying the location of unauthorized access ■ External integration with external user databases ■ Redundant configuration with automatic synchronization that does not interrupt operations ■ Support for "certificate authentication" through the issuance of certificate authority certificates *For more details, please refer to the catalog. Feel free to contact us with any inquiries.

  • Encryption and authentication
  • Firewall and intrusion prevention
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration