Work in a Secured Centralized Environment

Every organization’s security needs are different. Each business has different authorization needs, data clearances, and business procedures. It’s a challenge to ensure that all systems follow the same security rules within the organization.

Wyn fits your organization using built-in end-to-end security rules. Choose support for a variety of industry-standard protocols, including OAuth2, OpenID Connect, Active Directory, LDAP, and other federated security systems. Or choose from Wyn’s built-in extensibility for the security module to integrate with virtually any authentication methodology or security system your organization is currently using.

The web-based admin portal allows you to configure your security rules so your IT team can easily manage roles, permissions, licenses, users, and security. Apply business rules to users, folders, and reports.

Work in a Secured Centralized Environment
Security

Extensible Security for Your Enterprise’s Access Control Needs

Industry-standard support

Support for industry-standard protocols, such as OAuth2, OpenID Connect, ActiveDirectory, and LDAP; identity service acts as a federation gateway for external security providers

Extensible security on your terms

Out of the box extensible security module to customize to your security needs

Set it and forget it security

Role-based permission control for functionality and data access; user-context tracking for enhanced data access control

Granular data control for additional privacy

Multi-level hierarchical security means granular data control that offers another layer of privacy

Multi-tenant support

Filter and segregate your data, and limit your tenant-specific data with the configurable role-based security and user-context definitions

Stay Up To Date With Wyn Enterprise

Join the Wyn mailing list and never miss a product release or announcement.