Contact Us

SafeNet Authentication Manager

Support for Your Evolving Authentication Needs

SafeNet Authentication Manager provides organizations with a comprehensive platform to manage the full authentication life cycle across the enterprise and extend strong authentication to the cloud using a single, integrated system.

Offering extensive management capabilities for SafeNet’s entire range of one-time password (OTP), certificate-based and software authentication solutions, context-based authentication and step-up authentication, SafeNet Authentication Manager enables organizations to address their current and evolving secure access needs.

Gartner Market Guide for User Authentication CTA

Gartner Market Guide for User Authentication

Get the latest user authentication
trends and insights.

Download Your Free Copy 


SafeNet Data Protection Icon

SafeNet Authentication Manager’s context-based authentication capabilities allow organizations to achieve convenient, cost-effective secure remote access with unobtrusive strong authentication, while maintaining the flexibility and agility to add protection with stronger methods of security when required.

With its “step-up” authentication capabilities, SafeNet Authentication Manager makes it easier for users by requiring an additional authentication factor only if they don’t meet pre-defined policy rules determined by IT administrators.

SafeNet Authentication - Cloud Data Protection

Increasingly, more corporate applications are migrating to cloud computing environments and using Software as a Service (SaaS) based applications, necessitating a flexible and extensible strong authentication solution ensuring that corporate data and applications remain secure while also enabling easy user access to these cloud-based services.

SafeNet Authentication Manager addresses this challenge by providing a seamless, consistent strong authentication and SSO experience for enterprise users who need to securely access Office 365 and SaaS applications, such as (SFDC).

MobilePASS Icon

Employees are increasingly using non-IT sanctioned consumer devices to gain access to sensitive corporate and customer data. IT departments are struggling to enforce security policies on these devices exposing businesses to serious security vulnerabilities in the form of data breaches and unauthorized access.

SafeNet Authentication Manager addresses this challenge by offering credential life cycle management and over-the-air certificate provisioning for mobile devices, ensuring that only authenticated users with a trusted device can access corporate information and applications. With SafeNet Authentication Manager, organizations have the tools to authenticate users via a private trusted certificate that is stored on the device, ensuring that employees can safely access corporate resources with either their personal device or those issued by the enterprise.

Supported SafeNet Authenticators:

SafeNet Global Data Protection Icon

Supported Operating Systems:

  • SAM Server and Management: Windows Server 2003/R2, etoken
  • Windows Vista SP2 (32-bit, 64-bit), Windows 2008 R2 SP1 (32-bit, 64-bit), Windows Server 2008 SP2 (32-bit, 64-bit), Windows Server 2012 and 2012 R2 (64-bit), Windows 7 SP1 (32-bit, 64-bit), Windows 8 (32-bit, 64-bit), Windows 8.1 (32-bit, 64-bit), Windows 10 (32-bit, 64-bit)
  • MAC OS X 10.9, 10.10
  • Mobile Clients: iOS

User Repositories:

  • Microsoft Active Directory
  • ADAM
  • MS Microsoft SQL Server
  • Open LDAP
  • Novell eDirectory


SafeNet Authentication Manager
  • Multiple authentication methods and form factors
    • Native support for context-based authentication
    • Support for step-up authentication
    • Support for certificate-based, OTP, software, and

  • OOB authentication
    • Available form factors include key fob tokens, USB tokens, smart cards, software tokens, phone tokens Secure access to multiple resources
    • Cloud (SaaS) applications via support for SAML 2.0, e.g. SalesForce
    • VPNs
    • OWA, SharePoint and other Web-based portals
    • Virtual Desktop Environments, e.g. Citrix, VMware and AWS
    • Local network logon (supported in online and offline mode)

  • Support for secure mobility
    • Secure access using any authentication method from any endpoint
    • Credential provisioning and management for iOS devices

  • Native identity federation
    • Embedded support for federated login using SAML 2.0
    • Automatic user account registration and provisioning to select SaaS applications

  • Comprehensive management capabilities
    • Reporting and compliance
    • Single audit trail for entire authentication ecosystem
    • Separation of duties and role-based authorization
    • Reporting and audit tracking

  • Complete lifecycle administration
    • Self-service portals that allow user self-enrollment and token management
    • Certificate lifecycle management
    • Authenticator assignment, enrollment, and update based on predefined policies
    • Authenticator revocation, temporary disablement, and replacement
    • Temporary token provisioning

  • Flexibility to scale
    • Cross-domain management
    • Multi-forest Active Directory support


  • Extend secure access to cloud environments:
    Secure access, federated login and automatic user provisioning for SaaS applications.
  • Extend secure access to mobile endpoints: Credential provisioning and authentication management for iOS devices ensures that only employees with trusted devices can access corporate resources.
  • Achieve granular control with context-based authentication: Configurable policy rules to offer granular control over the level of authentication required each time a user logs on to an online resource.
  • Address different risk levels: Support for a broad range of authentication methods allows organizations to address numerous risk profiles.
  • Flexibility to grow: Evolve your authentication infrastructure to include OTP and CBA solutions, as well as advanced security applications.
  • Reduce support costs: Automated processes, over-the air activation and installation for software tokens, and intuitive self-service tools ensure extensive support for end users and lower helpdesk costs.
  • Maintain compliancy: Comprehensive auditing and reporting features enable compliance with privacy regulations.
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  

By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.