About Almetis   |   Helpdesk support   |   Contact us
Loading...

TOMS (Trusted Objects Management System) is the user and tool management solution which enables an organisation to operate a trusted infrastructure easily on a wide scale.

TOMS

TOMS in a few sentences...

• Management of a number of trusted devices (IAs+C chip cards, chip card terminals, generic cryptographic hardware or software resources

• Enables identities to be imported from the company's existing data sources

• Effective audit and traceability tools for the company's trusted infrastructure

• Integrated with any PKIX-compliant key management infrastructure (KMI)

 

 

 

TOMS manages a number of trusted devices (objects), e.g.:

• Identification, Authentication, Signature and Encryption (IAS+C) chip cards supplied by Almetis or other distributors,

• personal chip card terminals (e.g. the Personal CAT),

• generic hardware (e.g. cryptographic USB keys) or logical devices (tokens) providing a CAPI or PKCS#11-type standard interface.


With TOMS, managing the identities of the members of an organisation is easy and can be integrated into what already exists.

TOMS enables identities to be imported from the company's existing data sources, for example a LDAP-type directory. It offers two approaches for registering new identities, i.e. self-registration by users, subsequently validated by an authorised administrator, or centralised registration (an administrator creates and amends identities).

The company's organisational structure is reflected in the way identities and rights are managed. Users are grouped according to which organisational unit of the company they belong to (departments and services). Rights (authorisations) are managed individually and/or on a user group basis.


TOMS provides effective audit and traceability tools for the company's trusted infrastructure.

The audit and traceability function enables:

• logs of users' and administrators' main events and actions to be generated

• centralised supervision of several TOMS

• multi-criteria reports to be generated. TOMS can be integrated with any PKIX-compliant key management infrastructure (KMI)


The main components of a TOMS system are as follows:

• the database: contains data about users' identities and the trusted objects allocated to them

• the server software, the role of which is to perform client requests and provide an administration interface for one or more administrators

• the TOMS Administrator administration console

• the client software, the main role of which is to provide users with a simple interface for managing the life cycles of their trusted devices


TOMS together with Almetis professional solutions for personal use form a comprehensive, consistent and scalable security and trusted system.


TOMS makes life easier for the user, and security is no longer an issue.

If the user blocks his or her chip card PIN by mistake, he or she does not need to go and see the administrator. With the PIN remote unblocking service, TOMS enables the user to continue using the service.

TOMS provides secure automatic updating of embedded software for certain devices (e.g. Personal CAT chip card terminals) and of the security software installed on his or her workstation (authentication, signing and encryption software).