• Products
    • View all products
    • Free trials
    • Identity Governance and Administration
      • Identity Manager
      • Identity Manager Data Governance
      • Starling Connect
    • AD Account Lifecycle Management
      • Active Roles
      • Authentication Services
      • Starling Connect
      • Password Manager
    • Privileged Access Management
      • One Identity Safeguard
      • Safeguard Authentication Services
      • Safeguard for Privileged Analytics
      • Safeguard for Privileged Passwords
      • Safeguard for Privileged Sessions
      • Safeguard for Sudo
    • Access control
      • Defender
      • Starling Two-Factor Authentication
      • Password Manager
    • syslog-ng Log Management
  • Integrations
    • Integrations Overview
    • Cloud Infrastructure
    • Access Management
      • Ping
    • Applications
      • SAP
    • Privileged Access Management
      • Blue Prism
      • HashiCorp
    • Data
    • Compliance
  • Solutions
    • All Solutions
    • Secure the organization
    • Drive operational efficiencies
    • Enable compliance and auditing
    • Support digital transformation
    • Enhance log management
  • Resources
    • Blogs
      • Blogs A to Z
      • AD-Centered IAM
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Customer Stories
    • Documents
    • Events
    • Webcasts
    • Technical Documentation
    • Videos
    • Whitepapers
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
Active Directory Management and Security
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
Active Directory Management and Security
  • All tags
  • access management
  • access control
  • Active Directory
  • Active Roles
  • Active Roles 7.1
  • ActiveRoles Server
  • cis
  • Cloud
  • cloud access manager
  • events
  • governance
  • iam
  • IAM Active Directory
  • IAM best practices
  • IAM solutions
  • Identity and Access Management
  • Identity Governance
  • identity management
  • one identity
  • OneIdentityUNITE
  • Product Releases &amp
  • Security
  • Support
  • Technical
  • Thought Leadership
  • updates
  • Is Active Directory obsolete?

    Is Active Directory obsolete?

    Daniel.Conrad
    Daniel.Conrad

    What’s all this talk about Active Directory being obsolete?

    You may have heard rumblings that Microsoft Active Directory – lovingly acronymed as ‘AD’ – is “becoming obsolete and should be replaced”. You may have also heard that “you should reduce…

    • over 2 years ago
    • Blogs
    • Active Directory Management and Security
  • Global Survey – Are contractors following access rules and what are they viewing?

    Global Survey – Are contractors following access rules and what are they viewing?

    One Identity
    One Identity

    The modern business world doesn’t go around without them: contractors, outsourced service providers and partners. Collectively known as third parties, they can be outside developers, business consultants, freelancers or partners who must connect to your…

    • over 2 years ago
    • Blogs
    • Active Directory Management and Security
  • Authentication factors: any number over 1 is good!

    Authentication factors: any number over 1 is good!

    csaba.galffy
    csaba.galffy

    It's October, so it's National Cybersecurity Awareness Month! And one of the main themes for this year's edition is multi-factor authentication: login protection by using more authentication factors than just the password. The second factor could be a…

    • over 2 years ago
    • Blogs
    • Active Directory Management and Security
  • One Identity UNITE Partner Conference in Malta to Provide Engaging and Rewarding Experience

    Andrew.Clarke
    Andrew.Clarke

    In recent years, Malta has been a setting for many movies and TV series – the landscape and scenery providing a superb back-drop for many tales. One recent TV series that has filmed in Malta is the Game of Thrones.

    In our industry, we are living…

    • over 4 years ago
    • Blogs
    • Active Directory Management and Security
  • Hardware, Software or Out-Of-Band What's the Latest Trend for Two-Factor Authentication?

    Hardware, Software or Out-Of-Band What's the Latest Trend for Two-Factor Authentication?

    David.Miles
    David.Miles

    Most of us know what Two Factor Authentication is after all it has been with us for over 25 years. But while we have all been busy things have been changing slowly and steadily, especially when it comes to choosing whether to deploy hardware, software…

    • over 5 years ago
    • Blogs
    • Active Directory Management and Security
  • Solving the initial password dilemma

    Solving the initial password dilemma

    Jorge Lopez Miranda
    Jorge Lopez Miranda

    Many times companies use an initial password that is partially or completely static (Summer2017?), or sometimes they use a formula which includes partial data of the user such as the month of birth + the three final digits of their Social Security, etc…

    • over 5 years ago
    • Blogs
    • Active Directory Management and Security
  • How to Secure Confidential Attributes with Active Roles -Script Provided

    How to Secure Confidential Attributes with Active Roles -Script Provided

    Matthew Vinton
    Matthew Vinton

    The Challenge

    The Challenge

    Active Roles Access Templates are a terrific way of delegating access to Active Directory. They make securing Active Directory both simpler and more powerful. Access Templates can secure Active Directory at the object, attribute…

    • over 4 years ago
    • Blogs
    • Active Directory Management and Security
  • Conquer the challenges of Office 365, Azure AD and Hybrid AD management

    Conquer the challenges of Office 365, Azure AD and Hybrid AD management

    Daniel Gauntner
    Daniel Gauntner

    Organizations are sprinting to Office 365. In fact, users will have to convert by Oct. 13, 2020 as support for Office 2020 ceases that day. By then, many organizations will be 100-percent cloud, but most are so heavily invested in legacy infrastructure…

    • over 4 years ago
    • Blogs
    • Active Directory Management and Security
  • Active Roles 7.1 – Automation for On-Prem AD and Azure AD

    Active Roles 7.1 – Automation for On-Prem AD and Azure AD

    David.Miles
    David.Miles

    Using the single, familiar Active Roles interface, there is no longer a need to be constantly switching between consoles, and writing complex scripts in an attempt to automate, because Active Roles does it for you. 

    Creation of a user, for example, can…

    • over 5 years ago
    • Blogs
    • Active Directory Management and Security
  • How Active Roles 7.1 Interfaces With Both On-Prem and Azure AD

    How Active Roles 7.1 Interfaces With Both On-Prem and Azure AD

    David.Miles
    David.Miles

    With version 7.1, the One Identity Active Roles solution has expanded its scope to cover both on-prem AD (as its always done) and Azure AD. Here’s an explanation of how it works.

    The ADSI provider serves as the interface between the Active Roles…

    • over 5 years ago
    • Blogs
    • Active Directory Management and Security
  • Introducing Active Roles 7.1 – The Management and Security Solution for Hybrid AD

    Introducing Active Roles 7.1 – The Management and Security Solution for Hybrid AD

    David.Miles
    David.Miles

    Over the past couple of years Azure Active Directory and Office 365 have been quietly and steadily gaining ground within our businesses. While many administrators have been busy managing their environments, the level of effort involved in their daily…

    • over 5 years ago
    • Blogs
    • Active Directory Management and Security
  • Hybrid, on-premises or cloud – View all identities across all systems

    Hybrid, on-premises or cloud – View all identities across all systems

    Allison Main
    Allison Main

    Today, more than ever, organizations must address the proliferation of cloud-based applications and digitally transform their business to stay ahead of the competition and meet customer’s demands. While cloud applications provide convenient and flexible…

    • over 5 years ago
    • Blogs
    • Active Directory Management and Security
  • Join our April 19th Breakfast Event: Overcome native AD management tool limitations

    Join our April 19th Breakfast Event: Overcome native AD management tool limitations

    Danielle.Vorce
    Danielle.Vorce

    Join us April 19th for our breakfast event "Overcome Native AD Management Tool Limitations" at Privé Cafe at Marina at Keppel Bay in Singapore from 8am-11am GMT.

    Active Directory, simple and secure

    The capabilities of native Active…

    • over 5 years ago
    • Blogs
    • Active Directory Management and Security
  • How to Sprint to the Cloud Without Stumbling AKA: Effective IAM for the Hybrid AD Environment

    How to Sprint to the Cloud Without Stumbling AKA: Effective IAM for the Hybrid AD Environment

    Todd Peterson
    Todd Peterson

    The cloud isn’t coming — it’s here. And the quicker we all get on board, the better off we’ll be, right?!

    Digital transformation, IT modernization projects and cost-control initiatives all point to the cloud as the easiest, most…

    • over 3 years ago
    • Blogs
    • Active Directory Management and Security
  • ‘Identity in Depth’ and the Evolution of Defense- Join Joe Campbell at Cloud Identity Summit

    ‘Identity in Depth’ and the Evolution of Defense- Join Joe Campbell at Cloud Identity Summit

    Danielle.Vorce
    Danielle.Vorce

    Join Joe Campbell, One Identity  Principal Security Advisor for his session"'Identity in Depth';The Evolution of Defense" on Monday June 19th at 4:15PM in Ballroom X. 

    Here is a sneak peak:

    Traditional ‘Defense in Depth’ IT security strategies…

    • over 5 years ago
    • Blogs
    • Active Directory Management and Security
  • Stop Security Breaches in Your AD Environment, But What About Kindergarten?

    Stop Security Breaches in Your AD Environment, But What About Kindergarten?

    Michelle.Fallon
    Michelle.Fallon

    Exhibit A:  Teacher gave me an overview of my child’s theory on school.

    My 5 year old started kindergarten at public school this week. It’s not a huge difference for her – she’s attended daycare, preschool, pre-k for the last few years.…

    • over 5 years ago
    • Blogs
    • Active Directory Management and Security
  • When it Comes to IAM, Active Directory Matters

    When it Comes to IAM, Active Directory Matters

    Todd Peterson
    Todd Peterson

    Active Directory holds such a prominent position in the enterprise, that inadequate management and security of this universally accepted directory can be a major barrier to IAM success. For all its goodness, AD is woefully lacking in native management…

    • over 5 years ago
    • Blogs
    • Active Directory Management and Security
  • The Cloud and the New Role of IT Departments

    The Cloud and the New Role of IT Departments

    Danielle.Vorce
    Danielle.Vorce

    “The Cloud” is changing business in many ways. This discussion is mostly targeting B2B and B2C applications and how cloud and SaaS offerings are affecting access control and security.

    Cloud and SaaS offerings affect businesses in the reduced…

    • over 5 years ago
    • Blogs
    • Active Directory Management and Security
  • View related content throughout Blogs
  • More
  • Cancel
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2021 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support