• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
Active Directory Management (AD Mgmt)
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
Active Directory Management (AD Mgmt)
  • All tags
  • Active Directory
  • access management
  • Active Directory Management
  • Active Roles
  • Active Roles 7.1
  • AD account lifecycle management
  • Azure Active Directory
  • cybersecurity
  • events
  • Hybrid AD Environments
  • hybrid environment management
  • iam
  • IAM Active Directory
  • Identity and Access Management
  • Identity Governance
  • one identity
  • Product Releases &amp
  • provisioning
  • remote access
  • Security
  • Starling Connect
  • Support
  • Technical
  • updates
  • Zero Trust
  • Zero Trust Model
  • securing non human identities in hybrid environments

    Securing non-human identities in hybrid environments

    Vipin Jain
    Vipin Jain

    Securing non-human identities is just as critical as managing human ones in today's complex IT landscapes. Non-human identities, such as service accounts, application identities, and IoT devices, play pivotal roles in automation and system integration…

    • 20 days ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Why you need Active Roles, even if you have IGA

    Why you need Active Roles, even if you have IGA

    AJ Lindner
    AJ Lindner

    Here are two scenarios I come across frequently, with customers of all sizes, in all industries, when discussing One Identity Active Roles:

    1. “We have an IGA solution. It already manages our Active Directory just fine. Why do I need this?”
    …
    • over 1 year ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • How to find and manage privileged accounts in Active Directory (AD)

    How to find and manage privileged accounts in Active Directory

    Eric Hibar Jr.
    Eric Hibar Jr.

    When it comes to securing Active Directory, the first place to start is usually getting a handle on what currently exists - getting a ‘lay of the land,’ so to speak. In Active Directory, the admincount attribute can play a role in identifying privileged…

    • over 1 year ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Common Active Directory attacks

    Do you know how to stop the seven most common Active Directory attack methods?

    One Identity
    One Identity

    How do you protect your organization from Active Directory attacks?

    With over 95 percent of the Fortune 1000 companies relying on Microsoft Active Directory (AD) and Azure AD for authentication and single-sign-on support for their user populations, it…

    • over 1 year ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Active Directory management tools

    The Advantages of Using Active Directory Management Tools

    Robert Kraczek
    Robert Kraczek

    Active Directory (AD) and, more recently, Azure AD have become the de-facto standard for most organizations for controlling what their users have access to and how information flows, depending on memberships within the organizational structure. Some organizations…

    • over 2 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Better Together Podcast Series - Microsoft Active Directory security and One Identity Active Roles best practices

    Fences, guard dogs, Zero Trust and Active Directory security

    Daniel.Conrad
    Daniel.Conrad

     
    The Zero Trust model introduces a fundamental shift to an organization’s security strategy. From the outset, a Zero Trust model assumes that attackers will get in rather than solely focusing on keeping attackers at bay outside of a perimeter. Don’t get…

    • over 2 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • How do security-minded organizations approach Zero Trust?

    How do security-minded organizations approach Zero Trust?

    Megan Pennie
    Megan Pennie

    Interest in Zero Trust and identity security technologies is surging for IT leaders worldwide as breaches and targeted threats increase for organizations worldwide. Many wonder if they are making the right investments in security solutions to enable Zero Trust security…

    • over 2 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • 10 Best Practices to Secure Active Directory – From Real Users of One Identity Active Roles

    10 Best Practices to Secure Active Directory – From Real Users of One Identity Active Roles

    Megan Pennie
    Megan Pennie

    Account Lifecycle Management programs have transformed since the pandemic, and we heard from IT thought leaders and real users that they must make great strides to increase Active Directory (AD) security and efficiency to handle the digital transformation…

    • over 3 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • 2020 Tech Hangover Recovery - Expert Panelists Provide Informed Insights to Reinforce and Secure

    2020 Tech Hangover Recovery - Expert Panelists Provide Informed Insights to Reinforce and Secure

    Megan Pennie
    Megan Pennie

    What does the future of security hold? Is Zero Trust a real thing? Is a secure environment achievable for organizations, especially with the aftershocks from 2020? In this on-demand webcast, Cure the 2020 Tech Hangover, our lively panel of experts address…

    • over 3 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Three Ways to Improve Password Security and Self-service for Your End Users

    Three Ways to Improve Password Security and Self-service for Your End Users

    Megan Pennie
    Megan Pennie

    For enhanced password security, organizations need a simple, highly secure and efficient way for users to reset forgotten passwords and unlock accounts on their own. As an IT Leader, you must implement strong password policies and eliminate risk of data…

    • over 3 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Achieve Zero Trust Even When Active Directory is in the Way

    Achieve Zero Trust Even When Active Directory is in the Way

    Daniel.Conrad
    Daniel.Conrad

    After working with Active Directory for longer than I care to confess, the term ‘Zero Trust’ has bubbled up just about everywhere I look. For years, I ignored it, mostly because it sounds too good to be true. I assumed – as with some industry buzzwords…

    • over 3 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Secure Privileged Access in a Hybrid Active Directory World

    Secure Privileged Access in a Hybrid Active Directory World

    Megan Pennie
    Megan Pennie

    The ubiquitous use of Microsoft Active Directory (AD) and Azure AD in 95 percent of the global Fortune 1000 companies make it the primary target of cyberattacks. Now, as more and more organizations integrate their Privileged Access Management (PAM) into…

    • over 3 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • KuppingerCole Executive View on One Identity Active Roles

    KuppingerCole Executive View on One Identity Active Roles

    Megan Pennie
    Megan Pennie

    With Microsoft Active Directory (AD) and Azure Active Directory (AAD) in 95 percent of Fortune 1000 organizations worldwide, the hybrid AD environment is a huge target for cyberattacks. It’s a challenge to manage and secure AD/AAD account lifecycle management…

    • over 3 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Are we bouncing back or adjusting to a new way to work?

    Are we bouncing back or adjusting to a new way to work?

    Daniel.Conrad
    Daniel.Conrad

    As most companies and organizations adjusted to the abrupt change, I must admit that I missed some of the challenges they were facing. Our company, One Identity – which is a Quest Software business, was probably more prepared than most since a good portion…

    • over 3 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Welcome to My World – How to Easily Handle a Sudden Storm of Active Directory Provisioning Tasks

    Welcome to My World – How to Easily Handle a Sudden Storm of Active Directory Provisioning Tasks

    One Identity
    One Identity

    This current global health crisis has created chaos and hardship for individuals, families, companies and governments. With events canceled or postponed, offices closed and personal routines put on hold, life as we previously knew it, quickly changed…

    • over 4 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Bouncing Back from Forced Change – the Active Directory Angle

    Bouncing Back from Forced Change – the Active Directory Angle

    Todd Peterson
    Todd Peterson

    As you know, recent events forced nearly every organization in the world to quickly adjust the status of its workforce. Whether it was to transition office-based workers to remote access, to temporarily furlough employees with the intent to bring them…

    • over 4 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • You Can Live a Dual Life – Use Cases and Solutions for a Hybrid World

    You Can Live a Dual Life – Use Cases and Solutions for a Hybrid World

    mlfrance
    mlfrance

    Hannah Montana was right: you can have the best of both worlds. Though the late 2000s teen queen was singing about her secret double life as a high-flying pop star and a down-to-earth high school student, it turns out that that life goal now also applies…

    • over 4 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Can Pauline Find Productivity without AD-Centered Identity Management?

    Can Pauline Find Productivity without AD-Centered Identity Management?

    Todd Peterson
    Todd Peterson

    Which introductory experience do new hires to your organization get? Are they able to login on their first day and access all necessary resources to do their basic job? Or… are they temporarily assigned a left-over cubicle with no phone, computer or network…

    • over 4 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Join our April 19th Breakfast Event: Overcome native AD management tool limitations

    Join our April 19th Breakfast Event: Overcome native AD management tool limitations

    Danielle.Vorce
    Danielle.Vorce

    Join us April 19th for our breakfast event "Overcome Native AD Management Tool Limitations" at Privé Cafe at Marina at Keppel Bay in Singapore from 8am-11am GMT.

    Active Directory, simple and secure

    The capabilities of native Active…

    • over 7 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Active Roles 7.1 – Automation for On-Prem AD and Azure AD

    Active Roles 7.1 – Automation for On-Prem AD and Azure AD

    David.Miles
    David.Miles

    Using the single, familiar Active Roles interface, there is no longer a need to be constantly switching between consoles, and writing complex scripts in an attempt to automate, because Active Roles does it for you. 

    Creation of a user, for example, can…

    • over 7 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • How Active Roles 7.1 Interfaces With Both On-Prem and Azure AD

    How Active Roles 7.1 Interfaces With Both On-Prem and Azure AD

    David.Miles
    David.Miles

    With version 7.1, the One Identity Active Roles solution has expanded its scope to cover both on-prem AD (as its always done) and Azure AD. Here’s an explanation of how it works.

    The ADSI provider serves as the interface between the Active Roles…

    • over 7 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Introducing Active Roles 7.1 – The Management and Security Solution for Hybrid AD

    Introducing Active Roles 7.1 – The Management and Security Solution for Hybrid AD

    David.Miles
    David.Miles

    Over the past couple of years Azure Active Directory and Office 365 have been quietly and steadily gaining ground within our businesses. While many administrators have been busy managing their environments, the level of effort involved in their daily…

    • over 7 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Conquer the challenges of Office 365, Azure AD and Hybrid AD management

    Conquer the challenges of Office 365, Azure AD and Hybrid AD management

    Daniel Gauntner
    Daniel Gauntner

    Organizations are sprinting to Office 365. In fact, users will have to convert by Oct. 13, 2020 as support for Office 2020 ceases that day. By then, many organizations will be 100-percent cloud, but most are so heavily invested in legacy infrastructure…

    • over 6 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • How to Sprint to the Cloud Without Stumbling AKA: Effective IAM for the Hybrid AD Environment

    How to Sprint to the Cloud Without Stumbling AKA: Effective IAM for the Hybrid AD Environment

    Todd Peterson
    Todd Peterson

    The cloud isn’t coming — it’s here. And the quicker we all get on board, the better off we’ll be, right?!

    Digital transformation, IT modernization projects and cost-control initiatives all point to the cloud as the easiest, most…

    • over 5 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • How to Secure Confidential Attributes with Active Roles -Script Provided

    How to Secure Confidential Attributes with Active Roles -Script Provided

    Matthew Vinton
    Matthew Vinton

    The Challenge

    The Challenge

    Active Roles Access Templates are a terrific way of delegating access to Active Directory. They make securing Active Directory both simpler and more powerful. Access Templates can secure Active Directory at the object, attribute…

    • over 6 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • View related content throughout Blogs
  • More
  • Cancel
>
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2024 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center