Find below a feature comparaison of Visual Guard Code Project Edition with Visual Guard commercial editions.
Code Project Edition |
Professional Edition |
Enterprise Edition |
|
User Management |
|||
Create and Manage username/password accounts | |||
Use Windows accounts to identify
users [read more]
Declare Windows Accounts or Windows Groups in the system and give them access to your applications. |
|||
Manage User Groups [read
more]
Create groups and organize them in a hierarchy. Each group can contain sub-groups, username/password accounts or Windows accounts. You can grant a role to a group. In this case all the users in this group and in its sub-groups will have this role. |
|||
User Authentication |
|||
Form-based authentication (username/password combination) | |||
Single Sign-On (SSO) based on Windows Accounts [read
more]
Users start a Windows session as usual. When they open an application, Visual Guard uses the current Windows account to authenticate the user against Active Directory. As a result, the user does not have to provide his credentials each time he enters an application. |
(1) | (1) | |
Mixed Mode Authentication [read
more]
|
|||
Define a Password Policy [read
more]
|
|||
Web Single Sign-On (Web Portal)
[read more]
|
|||
Identity Federation [read
more]
Federate several Active Directory repositories belonging
to distinct networks or companies. Administrators declare Windows
accounts or Windows groups from these Active Directories in
a central Visual Guard Repository. Then, the corresponding users
can access the applications secured by the system. As a result,
you get one central security system, although users are spread
over several independent Windows domains. |
|||
Remote
Windows Authentication [read more]
|
|||
Off-line mode (remote users) [read
more]
If using a Winform or WPF application, the user can always enter the application, even if it cannot access the Visual Guard Repository: Visual Guard includes an offline store that contains the user permissions on the client-side and logs the user's operations in the application. When the application regains access to the Server, the offline store is automatically synchronized with the Visual Guard Repository. |
|||
Permissions and Roles |
|||
Application-level permissions [read
more]
Manage permissions to define how a user can access
and use each application. |
|||
Support for Static Permissions
[read more]
Each permission corresponds to one or several actions that
will activate, deactivate or modify the application's functionalities. |
|||
Support for Dynamic Permissions
[read more]
Each permission corresponds to one or several actions that
will activate, deactivate or modify the application's functionalities. |
|||
Hide/disable controls of the User Interface
[read more]
Visual Guard permissions (static or dynamic) may hide or deactivate components of your applications’ user interface. More generally, permissions can modify any property of a .NET or PowerBuilder component. For dynamic permissions, these modifications are dynamically performed by Visual Guard, without any need to modify the application code. |
|||
Filter data according to user permissions
[read more]
Restrict user access to a subset of the application
data. |
|||
Support for Application Roles [read
more]
Define a role that groups together all a user's permissions for one application |
|||
Support for Shared Roles [read
more]
Define a role that groups together all a user's permissions for multiple applications. |
|||
Grant Roles to User Accounts [read
more]
Assign a role to a user with either a username/password account or a Windows account. |
|||
Grant Roles to User Groups [read
more]
Assign a role to a Visual Guard group. All the accounts contained in this group and sub-groups will have this role. You can also give a role to a Windows group. In this case, all the Windows accounts in this Active Directory group will have this role. |
|||
Reporting & Auditing |
|||
Generate Access Control Reports
[read more]
Visual Guard administrators and auditors can generate reports based on the current security data (users, groups, roles, permissions...) |
|||
Logging and Auditing of End-user
operations [read more]
Save all sensitive operations users have performed in applications secured by Visual Guard. You can then generate reports on these operations (who has done what, when, etc...) |
|||
Logging and Auditing of Administrator
operations [read more]
Save all operations Visual
Guard administrators have performed (create accounts, give permissions,
etc...). |
|||
Visual Guard Applications |
|||
Windows Administration Console [screenshots] | |||
Web Administration Console [screenshots] | |||
Visual Guard Server [screenshots] | |||
Deployment utility for security data [read more] | |||
VG Federation Client | |||
Development technologies supported |
|||
.NET 2.0 and above, C#, vb.net, asp.net, Winforms, WCF, WPF, MVC3, MVC4 | |||
Silverlight | |||
PowerBuilder 8 and above | |||
Microsoft Sharepoint [read more] | |||
Any technologies Supporting HTTP Requests (Java, C++...) | |||
Architecture supported |
|||
2 tiers (Front-end + Database) | |||
n-tiers (Front-end + webservices + database) | |||
Multiple sites with distinct networks | |||
SaaS applications | |||
DBMS hosting the VG Repository: |
|||
Oracle | |||
SQL Server | |||
Proprietary File System | |||
Identity Stores |
|||
Active Directory | |||
Product Customization |
|||
Custom Identity Module (Support of identities & users accounts) | |||
Customization of the VG WebConsole (VG WebConsole Module) | |||
Try VG Pro | Try VG Enterprise | ||
Buy VG Pro | Buy VG Enterprise |
(1): Both VG for Azure and VG Community Edition support Windows Accounts, with the limitation of Active Directory and the VG Repository being installed in the same network. More complex configurations are supported by VG Enterprise.