Resources

Identity360 Architecture

ManageEngine Identity360 is a cloud-native solution that helps enterprises address workforce IAM challenges. The application is accessible over the internet without the need for any software installation.

Identity360 is built upon a resilient SaaS framework, embracing best practices to provide a scalable, highly accessible, and identity-first security solution in the cloud.

Components of Identity360

  •  

    Firewall

    The firewall secures all inbound communication to Identity360 service, shielding your applications accessing Identity360 service from malicious or unnecessary network traffic.

  •  

    WAF server

    The Web Application Firewall (WAF) strengthens application security by filtering HTTP requests. It protects web applications from attacks such as cross-site forgery, cross-site scripting (XSS), file inclusion, and SQL injection.

  •  

    Web app clusters

    The Web app cluster is a collection of application servers which is responsible for handling all incoming requests from an external network. This layer is designed with multiple nodes to handle many requests efficiently and to ensure minimal downtime for individual nodes.

  •  

    Job server

    The Job server manages backend tasks and plays a crucial role in processing scheduled jobs such as directory sync, bulk operations, etc. without affecting the performance of the main App server cluster.

  •  

    Database cluster and archives

    It securely stores Identity360 data and archives database data for disaster recovery as a precaution against potential risks.

  •  

    Microservices

    1. Logging service audits application logs.
    2. File service aids in the storage and retrieval of various data types, including customer logos and temporary processing data.
    3. Mailing service sends one-time passcodes or notifications to email addresses.
encrypting-sensitive-data-using-identity-manager-plus

How robust is the security of your data?

Identity360 is securely hosted within data centers, ensuring that all communications between the user's web interface and the central server are safeguarded by high-level enterprise encryption protocols. Meticulously engineered to provide utmost security at every phase, Identity360 delivers fortified security for user authentication, data transmission, and access through the entire workflow. All sensitive data is securely stored in an encrypted format within the data centers.

The data centers housing customer data were carefully designed to adhere to security best practices at all levels–physical, technical, people, and processes.

The inherent live replication, scheduled backup, and high availability architecture prevents data loss and ensures business continuity.

How does data segmentation happen?

All customer data is logically partitioned at the software level.

Upon signup, a segmented database is provisioned for your organization by default.

What do you require to access Identity360?

To get started with Identity360, all you need is a standard web browser such as Firefox, Microsoft Edge, or Chrome.

Guard your cloud resources with our cutting-edge IAM solution

Featured resources

Administator's guide

A handbook for admins to discover and leverage Identity360's capabilities.

Learn more
 
Datasheet

A brief overview of how Identity360 is tailored to benefit your organization.

Learn more
 
Product update

Upcoming features, enhancements, and other updates planned for Identity360.

Learn more