Ozone® Mobile – Credential Authorization
Ozone® Mobile further provides additional atomic authorization processes that may be implemented to ensure that only authorized devices can be allowed to access specific resources (as determined by the application owner).
Using Ozone®, application owners can retain control of managing their privileges and policies while taking advantage of a shared infrastructure. No other solution on the market provides both atomic authorization and the capabilities to rapidly PKI or device enable existing applications the way Ozone® does. Digital signatures are applied to every privilege and attribute used to make decisions so that even if a back-end database or directory is compromised, your privileges and attributes remain cryptographically protected to prevent modification or privilege elevation. Ideally suited for cloud virtual environments, Ozone® significantly reduces the risks introduced by using shared resources, and ensures that only authorized credentials can access protected resources – wherever they are hosted.