







| Aspects | Bastion host AAA management | Vendor AAA management | Nington AAA management |
|---|---|---|---|
| Operation experience | Insufficient authorization | Complicated interface | Easy operation and high modularity |
| Brand compatibility | High | Low, vendors' own products only | High, compatible with equipment of different manufacturers/brands (cisco, Huawei, H3C, Boda, etc.) |
| Two-factor account protection | Partially supported (usually bastion host only) | Not supported | Supported |
| Authorization level division | Primary authorization with restricted user login authorities | Advanced authorization with granularity covering device type and operation command | Advanced authorization, with granularity covering user role, device brand, device type, device level, and operation command |
| Audit method and degree of intuitiveness | Video audit, inconvenient for review | Report audit, intuitive and detailed | Report audit, clarifying operator, operation time, command and device |
| Audit footprint | Large | Small | Small |
| Business segmentation & control | Limited to user authentication | Vendors' own products only | Fine-grained authority division based on roles and scenarios for heterogeneous, compatible and unified management |
| Risk alarm | No SMS/e-mail alert | No SMS/e-mail alert | Sensitive command SMS/e-mail alert supported |

Virtual machine deployment

Centralized deployment

Distributed deployment

Cluster redundancy





Identity security anytime anywhere