DevOps Identity Management for Applications and Infrastructure

Your identity management should be as agile as your application development and deployment so Tremolo Security’s Unison offers an application focused approach to identity management.  We focussed on building a quick to deploy identity management solution that integrates the key components needed in any application deployment.

Authentication as Dynamic as Your Environment

Username and password?  Multi-factor? Customers and partners?  What about contractors?  Your environment likely has more then one type of user and one type of authentication so Unison provides multiple ways to authenticate beyond your username and password.  We make it easier to leverage your existing authentication investments, making them easier to integrate with more of your applications.

Dynamically Use Data From All of Your Sources

You likely have multiple Active Directory forests, databases and web services that store your identity data and all that data is likely not owned by the same person in your organization.  Unison’s LDAP virtual directory adds a layer capable of integrating with all of your sources in a way that lines up with your organization.

Combine DevOps and Identity Management

Tired of the “email shuffle”?  Are you constantly answering questions such as “Can I have access to?”,”Who can approve this access”, or “Where’s the audit trail”? Unison brings the automation of DevOps to your identity management requirements by automating the creation, removal and recertification of user access.  Take your administrators out of the job of answering tickets, manually creating access, and having to generate reports by combining DevOps and identity management with Unison.

Implement Your Compliance Goals

Are your identity management compliance goals not being followed because of technology that can’t implement them?  Nearly any rule you have we can cover since Unison is so light weight and flexible.  Automate your identity management compliance, just as you have automated the rest of your compliance workflows.


Authentication Types

  • Username and password
  • Compliance Acknowledgement
  • SAML2
  • OpenID Connect
  • TOTP (aka GoogleAuth)
  • U2F
  • Secret questions
  • OAuth2 Bearer Tokens
  • Kerberos
  • One-Time-Password over SMS
  • Certificates / PIV CAC

Data Stores

  • Active Directory
  • LDAP
  • Web Services
  • MongoDB
  • Kubernetes
  • OpenShift
  • OpenStack Keystone

Application Integration

  • Apache
  • Java
  • .NET
  • SAML2
  • Header

Deployment Options

  • RPM
  • Docker Container
  • Red Hat certified container