Getting Started
Unifyia Platform is a unified microservices-based, multi-tenant, cloud-native, centralized, zero trust
solution for identity orchestration and management for enterprises and governments. It offers simple,
seamless, and tailored customer experiences for all involved parties, all while upholding stringent
security measures. This solution aims at simplifying
and speeding up identity issuance and credential lifecycle management with agility and cost
efficiencies. It is a modern, agile, web-based, customizable solution for the issuance and management of
multiple types of identities and credentials such as PIV, PIV-I, CIV, Derived PIV (DPIV), and Derived
FIDO2 (DFIDO2) credentials on smart cards, tokens, and
mobile devices. You can issue them individually or in combination with other types of identities.
The Unifyia platform is a unified platform for sponsoring, enrolling, adjudicating,
issuing, and managing identities for users and partners. Organizations have the flexibility to customize
their identity issuance workflows to align with their internal policies and regulatory requirements. The
platform offers a wide range of configurations to enable the seamless adaptation of onboarding,
enrollment, adjudication, issuance, management, authentication, and authorization processes to
accommodate various stakeholders of the organization while adhering to FIPS, NIST, and FIDO2 standards
to ensure interoperability, security, and reliability.
Access to the Unifyia platform
Access to the Unifyia platform is determined by the group a user is assigned to. Group defines specific
roles, permissions, and access privileges. Organizations can assign these privileges at their discretion
in alignment with their policies.
Intended Audience
The intended audience can be generally categorized as administrators, operators, and end users. It may be
noted that the groups assigned define what tasks one can perform on the Unifyia platform and the
organization can always customize the permissions as per their requirement. For ease of understanding
and to get started with the platform, the entire documentation suite assumes that the set up tasks and
additional configurations as Administrator functions and the actions such as onboarding, enrollment,
adjudication, issuance, and identity management performed by Sponsors, Registrars, Identity Issuers,
Security Officers, and Helpdesk Operators as operator functions. Users can self-issue and manage the
identities as defined by the organization policy.
Supported browsers to access the Unifyia platform
- Google Chrome on Windows
- Microsoft Edge on Windows
- Safari on macOS
Setup Tasks
The table below lists the setup tasks that guide you, as an administrator, in configuring the various
options for identity orchestration. Each task includes detailed explanations, step-by-step instructions,
and best practices. Complete these configuration tasks to start using the Unifyia platform.
Task |
Description |
Unifyia Client Installation
|
Learn how to install the middleware client services for device communication.
|
System Administrator
Login
|
System Administrator (System Admin) registration for a passwordless authentication method during
first-time
login, using system-generated credentials for secure access and account
personalization.
|
Branding
|
Customize the platform as per your organization’s branding policies.
|
Content Signing Certificate
|
Upload an issuer content signing certificate to the database that will be used to
sign the data written to containers in the identity devices to ensure data integrity
and authenticity.
|
Directory Integration
|
Integrate directories such as Active Directory (AD) or Lightweight Directory Access
Protocol (LDAP) for user federation.
|
Certificate Authorities
|
Integrate certificate authorities for issuing digital certificates within a Public
Key Infrastructure (PKI) framework.
|
Notification Providers
|
Add an Email Server and SMS Gateway for notifications.
|
Notifications
|
Configure system-wide notifications for users, operators, and administrators for
timely updates and alerts.
|
Manage Roles and Permissions
|
Manage roles permissions, device actions, and role-based authentication.
|
Conditional
Access
|
Learn how to control access for administrators by whitelisting IP addresses.
|
Passkeys (FIDO2) Policies
|
Configure registration and authentication policies for the passkeys (FIDO2) as per
FIDO2 specifications.
|
Groups
|
Learn how to add groups, assign roles, and add members to the group.
|
Device Profiles
|
Configure device management keys for identities such as smart cards, security keys,
and digital identities on mobile devices.
|
Visual Designs
|
Configure designs for the ID cards or electronic identities.
|
Workflows
|
Configure workflows for defining enrollment requirements and credential issuance.
|
Reports
|
Learn more about the comprehensive report generation module that empowers
administrators and decision-makers to access various compliance reports.
|
How-To-Guides
|
Access use case based step-by-step instructions for completing specific
tasks.
|
User and Credential Management Tasks
The table below lists the tasks that guide you, as an operator, in managing users and identities."
Task |
Description |
User Management
|
Manage user onboarding and enrollment. Add administrators, operators, and users. Assign
groups that determine the role, permissions, and access privileges. You can also enroll users in
bulk.
|
Credential Management
System
|
Learn how to issue different types of identity devices, issue credentials, authenticate using those credentials, and manage the complete lifecycle of issued identities and credentials granularly.
|
Additional Configurations
The table below lists additional configurations that an administrator can manage.
Task |
Description |
Security Audit
|
Choose which events must be logged and/or signed with the digital signature certificate of
the logged-in user for security audit.
|
Integrate IdPs
|
Integrate IdPs such as Entra ID, Okta to enable SSO functionality and identity
federation. The platform supports OpenID Connect (OIDC) and Security Assertion Markup
Language (SAML) protocols.
|
SCIM Provisioning
|
Learn how to leverage the SCIM-compliant APIs to integrate SCIM clients to facilitate
centralized management of user data and identities across multiple domains or systems.
|
Enterprise Connections
|
Learn how to consume external Identity Provider's (IdP) custom APIs for user
provisioning. The platform currently supports Okta.
|
Integrate SSO Applications
|
Learn how to integrate SSO applications such as Entra ID and Okta for single sign-on. The
platform supports SSO over OpenID Connect (OIDC) and Security Assertion Markup
Language (SAML) protocols.
|
External CMS
|
Integrate an external credential management system for PIV issuance and management.
|
Passkeys
(FIDO2) Provisioning
|
Integrate relying parties for passkeys (FIDO2) provisioning.
|
HSM
|
Integrate a Hardware Security Module (HSM) for secure management of cryptographic keys.
|