• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
Identity Governance & Administration
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
Identity Governance & Administration
  • All tags
  • identity manager
  • governance
  • access control
  • access governance
  • access management
  • Business agility
  • case study
  • Cloud
  • Compliance
  • Digital Transformation
  • Enterprise Provisioning
  • GDPR
  • HIPAA compliance
  • HIPAA Security Rule requirements
  • HIPPA
  • hybrid
  • iam
  • Identity and Access
  • Identity and Access Management
  • Identity Governance
  • identity management
  • identity mangaer
  • one identity
  • One identity manager
  • Starling Connect
  • Thought Leadership
  • User identities
  • application onboarding a critical need in identity governance

    Application Onboarding: A Critical Need in Identity Governance

    Ted Ernst
    Ted Ernst

    What is application onboarding? It is the deployment of software and the granting of user access with the proper permissions and roles defined. More importantly, it is putting that application under the control of an identity governance product or process…

    • over 3 years ago
    • Blogs
    • Identity Governance & Administration
  • Worldwide conglomerate easily achieves IGA success with its digital transformation

    Worldwide conglomerate easily achieves IGA success with its digital transformation

    Allison Main
    Allison Main

    Otto Group IT serves the technology needs of companies around the world. Its clients span industries, including retail, finance and logistics. As the conglomerate undertook digital transformation initiatives, its legacy identity governance and administration…

    • over 5 years ago
    • Blogs
    • Identity Governance & Administration
  • Starling Connect target system connectors at GA

    Allison Main
    Allison Main

    Alex Binotto is the Senior Product Manager for Starling Connect and has provided the list of connectors and target systems available now and what is coming soon. If you have a requested system, please email Alex.

    Target System

    Description

    Availab…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • New Release unifies governance for on-premise, hybrid and cloud deployments

    Allison Main
    Allison Main

    Starling Connect is now GA

    Today, organization must launch new services and cloud applications quickly to stay competitive. As we all know, Identity and Access Management (IAM) is the platform to manage these identities through a standard set of processes…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • B. Braun in Germany automates identity and access management for security and compliance while enabling digital transformation

    Allison Main
    Allison Main

    For B. Braun, one of the world´s leading providers of healthcare solutions based in Melsungen, Germany, the challenge was particularly acute. B. Braun needed to increase security, guarantee compliance, and control access to company data, especially…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Union Investment gets speed, flexibility and compliance from Identity Manager

    Allison Main
    Allison Main

    In the highly regulated investment industry, security and speed are critical.

    Union Investment has been in business for more than 60 years with over 320 billion in asset and management. 

    Union Investment needed a flexible identity and access management…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • The University of Maribor Covers Identity and Access Management Under One Umbrella for More Than 30,000 Users

    Allison Main
    Allison Main

    The University of Maribor is the second-largest university in Slovenia, with around 30,000 students enrolled across 17 facilities. The university’s goal is to improve its international standing, the quality of its education and research, and the efficiency…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • AGL Energy Enhances Business Agility, Empowers Staff and Boosts Compliance

    Allison Main
    Allison Main

    “We have created a more agile business where personnel are empowered around access rights. We’ve made the working environment more flexible, giving people access to the applications they need, just when they need them, through Dell One Identity…

    • over 9 years ago
    • Blogs
    • Identity Governance & Administration
  • Ensuring Compliance With HIPAA Security Rule Requirements

    Ensuring Compliance With HIPAA Security Rule Requirements

    Allison Main
    Allison Main

    Just because you leverage the user, group and role-based management features of certified Electronic Health Record (EHR) systems that doesn’t mean you’re doing enough to secure healthcare data and ensure compliance with HIPAA Security Rule requirements…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • How to Achieve HIPAA Security Compliance

    How to Achieve HIPAA Security Compliance

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn’t seem to be getting easier. First of all, IT security compliance efforts are forever competing for attention and funding with information-security projects, operational vulnerabilities…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • View related content throughout Blogs
  • More
  • Cancel
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center