Fordway

Identity and Authentication Management Service (IDAMS) from Fordway

Fordway Identity and Authentication Management Service (IDAMS) is a cloud-based, user identity and authentication service. Provides an authoritative source of identity to authenticate against corporate, PSN, Web, Cloud and hosted systems. Minimises time and complexity of brokering authentication and access to internal, private, hybrid and public cloud services

Features

  • Single authoritative identity source and set of credentials
  • Seamless authentication with single set of attributes between linked systems
  • User self-service: All available services published to authorised users
  • Web portal: single web portal for identity management and authentication
  • Self-service password reset: Users can securely reset passwords themselves
  • Multi-Factor authentication – Secure tokens or challenge response systems
  • PSN service available
  • Directory connectors include: Active Directory, LDAP, NIS and eDirectory
  • Web services include; SAP, Oracle, PeopleSoft, SQL Server and Sharepoint
  • Web Apps include: Office 365, Salesforce, Service Now, Google Apps

Benefits

  • Formal audit trail for regulatory and compliance purposes
  • Access to any system from any location
  • Map to business processes: workflows aligned to your organisation’s processes
  • Single sign-on: no additional logon needed for accessing multiple applications
  • Enhanced security: every element is secured and encrypted
  • Consistency of Approach: simplified login process reduces user support costs
  • Simplifies user experience, reduces security and compliance risks
  • No requirement for your own staff to manage the solution
  • Simplifies user experience, reduces security and compliance risks
  • 24 x 7 x 365 Support

Pricing

£0.25 to £3.50 per user per month

  • Free trial available

Service documents

G-Cloud 10

667405191070875

Fordway

Richard Blanford

01483 528200

sales@fordway.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints The service runs active/active across two datacentres. There is no requirement for planned downtime of the underpinning service infrastructure, it is available 24x7x365. OS and application patching of instances may require server instance downtime but the service will not be affected. Due to operating from a fully resilient and virtualised environment there is no requirement for planned downtime of the underpinning IaaS infrastructure, each quarter Fordway reserve the right to invoke a 4 hour maintenance window, a maximum of two of these can be invoked per datacentre in any rolling year.
System requirements
  • Range of standard connectors available
  • Custom connectors can be developed to client need
  • Data import from multiple authoritative sources

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Fordway provide a standard SLA that details response times which can be tailored to customer needs.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 A
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Fordway IDAMS is a fully resilient service which offers 99.95% availability. Fordway provide a standard SLA that details response times which can be tailored to customer needs.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Fordway have an on-boarding process for this service as it requires detailed configuration information and implementation of interfaces. The on-boarding process will be subject to a project framework in which full testing, pilot and handover will be tasked. This will include training of users and system administrators. Process requirements are detailed in the Service Description.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction Fordway have an exit procedure with which we work with the user to exit or migrate away from this service, depending on the configuration of the solution. This exit procedure will include any data, performance statistics and service records as described within the contract along with any associated costs. Process requirements are detailed in the Service Description.
End-of-contract process Fordway have an exit procedure with which we work with the user to exit or migrate away from this service, depending on the configuration of the solution. This exit procedure will include any data, performance statistics and service records as described within the contract along with any associated costs. Process requirements are detailed in the Service Description.

Using the service

Using the service
Web browser interface No
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None for normal operation and authentication. Setting up new authentication workflows and granting approvals requires a desktop client.
Accessibility standards WCAG 2.0 A
Accessibility testing Not done
API Yes
What users can and can't do using the API Users can not set up the service, this requires approved customer service administrators with enhanced privileges. Users can change their details and request approvals for new authentications.
API documentation No
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The service offers multiple authentication connectors. Users choose which connectors are required to deploy dependent on the target infrastructure and the customer's requirements. Customisation will be aligned to the contract and supporting SLA.

Scaling

Scaling
Independence of resources Each client has a dedicated instance of IDAMS with reserved capacity aligned to their organisational requirements and use.

Analytics

Analytics
Service usage metrics Yes
Metrics types Metrics available include:
Minimum and maximum user connections per period
Which authentication connectors are used per user and in total
Audit trail of user activities
Performance and availability of service
The service is based on an underpinning database that can provide defined usage metrics against information held
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Dell Software plus Quest and Fordway developed add-ons

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users can export their data on request and in an agreed format depending on their requirements
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats As agreed on request
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats As agreed on request

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks Disclosed on request
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network Disclosed on request

Availability and resilience

Availability and resilience
Guaranteed availability Fordway provide a standard SLA with availability of 99.95% measured annually; 99.9% any quarter. Fordway recompense users with a credit of 2.5% of the monthly service contract value for each working hour the service has not met the SLA up to a maximum of 20% of the monthly service charge
Approach to resilience All elements of the service are operated and secured to ISO27001 under Fordway’s existing certification. Fordway IDAMS is hosted and runs active/active across our two datacentres on Fordway's PSNSP Accredited PaaS service which meets OFFICIAL classification and has optional additional controls to meet OFFICIAL-SENSITIVE. Public Sector customers can access the service over the PSN; NHS clients over N3/HSCN. Both types of network connectivity are resilient across Fordway’s two datacentres.
Outage reporting The service provides service updates which are notified into the client dashboard in their portal and can be configured to send email alerts if desired. The service operates under Fordway's standard SLA and any service outages will be reported as per the SLA which can be tailored to the customer's requirements.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels None
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 ISOQAR
ISO/IEC 27001 accreditation date 14/03/2016
What the ISO/IEC 27001 doesn’t cover Statement of Applicability disclosed on request
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • Cyber Essentials
  • Cyber Essentials Plus
  • PSN Service Provider (PSN-SP)
  • Pan Government Accreditation to OFFICIAL
  • NHS IGSoC for N3/HSCN certification

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes These are defined and audited as part of Fordway's ISO27001 certification, with regular senior management review. Details and supporting documentation will be made available on request.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Fordway change and configuration process aligns with ITIL v3.0 and ISO27001 and ISO20000
Vulnerability management type Supplier-defined controls
Vulnerability management approach Fordway's risk management aligns with ISO27001
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Fordway's security incident and event monitoring conforms to ISO27001 and DPA requirements. Any incident will be assessed for risk and prioritised accordingly.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Fordway incident management process complies to ISO27001:2013 and aligns to ITIL best practise and ISO20000. Incident management and reporting is defined within Fordway's standard SLA and tailored to customer requirements.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • Public Services Network (PSN)
  • New NHS Network (N3)

Pricing

Pricing
Price £0.25 to £3.50 per user per month
Discount for educational organisations No
Free trial available Yes
Description of free trial On application

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑