Create, store, and administer large volumes of user accounts — up to millions. Manage them from a central repository or deploy them across multiple sites. Users can also be automatically provisioned based on their Windows / Active Directory group membership, reducing manual account creation and ensuring alignment with your enterprise directory structure.
Create and manage login/password accounts within Visual Guard. Grant them rights to access specific data and features inside your applications.
Use Windows accounts to authenticate users accessing your application. Grant rights to Windows accounts or Windows groups to access specific application data or features.
You can authorize user administrators to add, edit, and remove Windows accounts with the Visual Guard Console.
Allow users to create an account for themselves. Grant them automatically default, limited access rights. You can choose to require administrator validation before they can access the application.
Define a hierarchy of groups that replicates the structure of your organization. Place users in groups and grant access rights at the group level.
Users must provide a valid login/password combination before accessing your application.
Users must provide valid Windows credentials before accessing your application. Optionally, you can let users enter the application without asking for their credentials (see Windows SSO below).
Highly secured, yet very simple for end-users: they authenticate via pin code or fingerprint on an authorized device (mobile or web browser). Administrators define MFA enforcement policies at the group level — specifying which Active Directory or Azure AD groups require MFA and which can be excluded. Developers can also trigger MFA validation programmatically, enabling integration into custom workflows and automated processes. Read more
Users can log in to your application with their Windows credentials, even when connecting from a remote location (hotel, airport, public Wi-Fi, mobile Internet).
The same application can accept several types of authentication simultaneously — for example, Windows accounts for internal users, login/password for external users, and strong authentication for critical operations. Read more
Reuse Windows accounts located in several Active Directories, whether or not they belong to the same network. Security is centralized while users are distributed across multiple sites or organizations. Read more
Windows users can access your application without entering their credentials. Visual Guard automatically captures the current Windows session and applies the access rights granted to that account.
Users can log in once and navigate across several websites without authenticating again, regardless of whether the sites share the same network. Read more
Users can log in and access a desktop application without a network connection. Visual Guard operates locally to authenticate users and enforce their permissions. Supports .NET WPF and WinForms applications.
For login/password accounts, customize the rules for defining, renewing, unlocking, and expiring a password. For Windows accounts, the current Active Directory password policy applies.
Create precise permissions to control access to specific data and features inside your applications — menus, buttons, fields. Group permissions into permission sets and roles.
Enforce permissions with dynamic actions: change object properties at runtime in your application (e.g. disable a menu item, hide a field). These actions are defined and stored in Visual Guard, independent of the application code, and applied at runtime.
Your code retrieves user permissions via the Visual Guard API and enables the appropriate application features. For example: if the user has the permission "Can_Read_Invoice", enable the button "View_Invoice".
Grant roles or permissions to users via the Visual Guard Console, or programmatically via the VG API.
Grant roles to groups. When placing users in groups, they automatically inherit the roles of their group. Optionally, you can choose to propagate group roles to sub-groups.
Define workflows to automate approval processes for access requests, role assignments, and permission changes. Each workflow enforces a structured validation sequence before any change is applied, ensuring governance policies are respected and reducing the risk of unauthorized access.
Trigger automated email notifications in response to specific user events — account creation, role assignment, access requests — keeping administrators and approvers informed at each step of the process.
Workflows can be triggered to automatically lock accounts, revoke or reassign roles, force a password change at next logon, and alert administrators in response to suspicious activity or policy violations.
Build workflows from a library of configurable operations: conditional logic (if/else), user retrieval, role assignment, user approval or locking, password policy enforcement, URI calls for external integrations, and automatic generation of documentation or permission matrices.
Designate a Master Admin as the impersonated user for workflow or Identity Server operations. Reassignment is required before deletion, ensuring consistent integrity across user mappings.
Track workflow execution in real time. Every request, approval, and automated action is logged, providing a complete audit trail for compliance and operational review.
Record important events for traceability: user logon, business operations, administrator actions, system security events.
Follow critical activities in real time — access to confidential data, sensitive transactions, security changes. Detect suspicious events such as critical operations at unusual times.
Automatically alert administrators, controllers, or managers of important or suspicious activities.
Review business operations in detail: who did what, when, and from where. Filter by application, user, date, device, or event type. Pinpoint issues or suspicious events.
Validate and audit user permissions for Identity Server and workflow impersonation operations. Visual Guard verifies role-based access rights, logs insufficient privileges for traceability, and alerts administrators when required rights are missing.
Analyze activity trends with graphs. Detect potential issues such as unusual transaction volumes.
See how each application is used. Display the time and number of successful or failed connections.
Review administrator activities — user creation, permission grants. Filter by application, user, date, device, or event. Pinpoint issues or suspicious events.
Generate reports on the access control configuration: users, groups, access rights, and more.
Ready-to-use, Windows-based application designed for developers and master administrators setting up the environment and managing application security.
Ready-to-use web application dedicated to administrators managing users and granting access rights, and to auditors reviewing application security. Configuration is automatically backed up, protecting critical settings against accidental changes or system failures.
Deploys a security database from development to test and production environments. Supports batched deployment for large repositories, ensuring stable and efficient processing when managing high volumes of users.
Production server managing user identities, authentication, and access control for Visual Guard-secured applications. Verifies credentials, enforces security policies, and exposes services consumed by connected applications. Supports Single Sign-On, identity federation, OAuth 2.0, and OpenID Connect. Read more
VG APIs expose hundreds of methods for securing applications in production — authenticating users, enforcing permissions, logging activities — and administering security: managing users, groups, roles, and permissions.
Centralize the security of all your applications. Get a global overview of all users and their access rights across the entire IT system, with comprehensive and uniform control and audit across all applications.
Add a VG .NET runtime to your applications to secure them. Supports WinForms, WPF, ASP.NET, WCF, MVC, as well as SharePoint applications.
Add a VG PowerBuilder runtime to your PowerBuilder applications to secure them.
Call the web services exposed by the Visual Guard Identity Server to authenticate users, enforce permissions, and log activities from any language capable of web service calls.
Get the full source code of the web administration console and adapt it to your business needs. Implement your business logic and call the VG API to manage and audit security. Our support team will assist you every step of the way.
Develop a module to integrate with a third-party authentication provider. Our support team will guide you every step of the way.
Implement custom security rules for your application — for example, enforce segregation of duties by defining which roles or user groups must be mutually exclusive. Our support team will guide you every step of the way.