Work in a Secured Centralized Environment
Every organization’s security needs are different. Each business has different authorization needs, data clearances, and business procedures. It’s a challenge to ensure that all systems follow the same security rules within the organization.
Wyn fits your organization using built-in end-to-end security rules. Choose support for a variety of industry-standard protocols, including OAuth2, OpenID Connect, Active Directory, LDAP, and other federated security systems. Or choose from Wyn’s built-in extensibility for the security module to integrate with virtually any authentication methodology or security system your organization is currently using.
The web-based admin portal allows you to configure your security rules so your IT team can easily manage roles, permissions, licenses, users, and security. Apply business rules to users, folders, and reports.
Extensible Security for Your Enterprise’s Access Control Needs
Support for industry-standard protocols, such as OAuth2, OpenID Connect, ActiveDirectory, and LDAP; identity service acts as a federation gateway for external security providers
Extensible security on your terms
Out of the box extensible security module to customize to your security needs
Set it and forget it security
Role-based permission control for functionality and data access; user-context tracking for enhanced data access control
Granular data control for additional privacy
Multi-level hierarchical security means granular data control that offers another layer of privacy
Filter and segregate your data, and limit your tenant-specific data with the configurable role-based security and user-context definitions
Stay Up To Date With Wyn Enterprise
Join the Wyn mailing list and never miss a product release or announcement.