Mobile Identity Access Management

Specifically, the IAM capabilities can include strong two-factor authentication, access control, single sign-on, identity federation, and on-demand policy deployment and enforcement. Authentication can be context-based and support an array of technologies that span microSD and smart cards, OTP, biometrics, tokens, and more.

Good Trust enables a variety of use cases with IAM capabilities:

  • Strengthen mobile device security and data protection.
  • Increase mobile worker productivity with seamless single sign-on.
  • Enable mobile devices to gain secure physical access to buildings.