AuthControl Sentry® architecture
AuthControl Sentry® can secure access
to hundreds of applications, whether your
architecture is on-premise or cloud based.
Authenticate access
for all stakeholders
There are no restrictions with AuthControl Sentry®.
It’s designed to authenticate access to applications whether
they’re hosted in the cloud or on-premise, and whether the
user is a customer, an employee, or a supplier requesting access.
AuthControl Sentry® application diagram
AuthControl Sentry® can be used to authenticate access for ALL stakeholders.
One flexible and intelligent authentication process for all stakeholders means security is easier to manage and configure for the entire organisation. This diagram provides an overview of AuthControl Sentry® utilisation with employees, suppliers, and customers, whether accessing the applications on-premise or in the cloud environment.
On-premise architecture
Active Directory integration - Access internal systems via our Active Directory Agent, a locally installed software application that removes the need to share your Active Directory across the Internet, whilst maintaining user account synchronisation.
Comprehensive administration - With our expert team maintaining the infrastructure, the only thing left for you to manage are the integrations, policies and users. All administration is via our simple-to-use, comprehensive graphical user interface.
Single sign-on (SSO) - To make life easy and simplify administration, AuthControl Sentry® provides a seamless and unified approach to authentication. All authentication requests can be routed and controlled via our single sign-on page, based on the risk policies you define.
Cloud based architecture
A fixed IP - Each AuthControl® customer receives a dedicated fixed IP for their own virtual instance. There is no shared resource, no shared application programming interface and no shared entry portal.
A dedicated offering - AuthControl® Cloud gives you a dedicated virtual machine. There are no shared multi-tenanted options, so you can expect total management and control which means you have the flexibility to configure the solution to meet with your exacting needs.
A private firewall - We offer dedicated and independent firewalls for each customer, allowing tailored security and access control lists.
Architecture for authenticating access to Office 365
AuthControl Sentry® can integrate with hundreds of applications making it one of the most flexible solutions for protecting your business.
In this example, risk-based authentication can be implemented to protect Office 365 from unauthorised access by deploying
AuthControl Sentry® as a filter against the ADFS Proxy only and not the internal ADFS servers.
Architecture for authenticating within a banking environment
AuthControl Sentry® is utilised across a variety of industries including financial institutions where preventing unauthorised access is critical.
This example architecture of AuthControl Sentry® in the banking environment shows how it utilises different resources to request an appropriate level of authentication from the user dependent on the request.
Architecture for integrating with firewalls
This example provides an architecture using Palo Alto next generation of firewalls. AuthControl Sentry® (with a range of factors) can integrate with Palo Alto firewalls to authenticate users with Active Directory through single or dual channel.
Find out moreOptmising security without compromising efficiency
This architectural example is provided for organisations requiring optimum security with fully deployed multi-factor authentication for every user within the business, without compromising the efficiency of carrying out their day-to-day activities.
Find out moreArchitecture for integrating with Kemp Web Application Firewall
This example provides an architecture using Kemp's Web Application Firewall. Kemp technologies together with AuthControl Sentry® delivers efficiency and innovation by empowering customers to securely deliver applications.
Find out more