4 Integrations with Powertech Multi-Factor Authentication

View a list of Powertech Multi-Factor Authentication integrations and software that integrates with Powertech Multi-Factor Authentication below. Compare the best Powertech Multi-Factor Authentication integrations as well as features, ratings, user reviews, and pricing of software that integrates with Powertech Multi-Factor Authentication. Here are the current Powertech Multi-Factor Authentication integrations in 2025:

  • 1
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 2
    Powertech Password Self Help for IBM i
    Enabling users to reset their own IBM i passwords immediately removes productivity bottlenecks for both users and the IT support technicians who would typically have to process the request. When users don’t have to file a help desk ticket for password resets, IT can spend their time addressing more critical issues. With password resets accounting for up to 50 percent of help desk calls, productivity gains add up quickly. Guarantee the authenticity of users and prevent fraudulent reset requests by asking a series of challenge questions that must be answered correctly before a reset will be approved. Configure settings to meet security policy requirements. Set rules for the minimum number of password characters, whether repetition of characters is allowed, and whether answers must be case-sensitive.
  • 3
    Yubico YubiKey
    Protect your digital world with YubiKey. Stop account takeovers, go passwordless and modernize your multifactor authentication. Get the world’s leading security key for superior security, user experience and return on investment. Designed for personal and business use, the YubiKey comes in a variety of shapes and with different features to fit your needs. Take our quick Product Finder Quiz to find the right key for you. The YubiKey works with hundreds of services and software applications. We’re here to guide you getting started whether for personal or business use. The industry's #1 security key, enabling strong two-factor, multi-factor and passwordless authentication. With a simple touch, the multi-protocol YubiKey protects access to computers, networks, and online services. No more reaching for your smartphone, or re-typing passcodes. Just plug in your YubiKey, tap, and it does the rest for you.
  • 4
    IBM i
    IBM i is an integrated operating environment developed by IBM, consisting of operating system, database, middleware, and development tools. IBM I, a platform for innovators, by innovators. The latest update to IBM i has arrived. With IBM i 7.4, you'll get continuous availability (thanks to IBM Db2 Mirror for i), the latest security features, and easy integration with IoT, AI and Watson. Ensures mission-critical applications remain up and running. Enhanced security features implement the latest industry-standard practices. Protect critical business applications and data. New auditing capability at the object level. Industry-standard Open Source environments. Port more applications to IBM I. Easily integrate with IoT, AI and Watson. Get work done 24 hours a day, 7 days a week, 365 days a year. Transfer virtual save media to and from the cloud. Consolidate most commonly used tasks for managing IBM i.
  • Previous
  • You're on page 1
  • Next