<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://www.oneidentity.com/community/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Identity Governance &amp; Administration</title><link>https://www.oneidentity.com/community/blogs/b/identity-governance-administration</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Mon, 12 Jan 2026 09:00:00 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://www.oneidentity.com/community/blogs/b/identity-governance-administration" /><item><title>Introducing One Identity Manager 10.0</title><link>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/introducing-one-identity-manager-10-0</link><pubDate>Mon, 12 Jan 2026 09:00:00 GMT</pubDate><guid isPermaLink="false">5f2f4fa7-ebc7-4803-900c-42d427844a5e:40716dfa-e38b-4895-9eab-69efd4695d5c</guid><dc:creator>lori cotton</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.oneidentity.com/community/blogs/b/identity-governance-administration/rsscomments?WeblogPostID=7078</wfw:commentRss><comments>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/introducing-one-identity-manager-10-0#comments</comments><description>With so many applications and user accounts to govern and manage, &lt;a href="https://www.oneidentity.com/what-is-iga/"&gt;IGA&lt;/a&gt; is often a headache that keeps you up at night and plagues your organization with unused or less-used credentials that put your company at risk. &lt;a href="https://www.oneidentity.com/products/identity-manager/" rel="noopener noreferrer" target="_blank"&gt;One Identity Manager&lt;/a&gt; release 10.0 o...(&lt;a href="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/introducing-one-identity-manager-10-0"&gt;read more&lt;/a&gt;)&lt;img src="https://www.oneidentity.com/community/aggbug?PostID=7078&amp;AppID=43&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/identity%2bmanager">identity manager</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/Identity%2bGovernance">Identity Governance</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/SAP">SAP</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/iam">iam</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/identity%2bsecurity">identity security</category></item><item><title>Strengthen your identity fabric to protect your identity ecosystem</title><link>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/strengthen-your-identity-fabric-to-protect-your-identity-ecosystem</link><pubDate>Thu, 08 Jan 2026 23:31:51 GMT</pubDate><guid isPermaLink="false">5f2f4fa7-ebc7-4803-900c-42d427844a5e:428146fa-8eb8-4c70-b533-5a043e4721b0</guid><dc:creator>Megan Pennie</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.oneidentity.com/community/blogs/b/identity-governance-administration/rsscomments?WeblogPostID=7086</wfw:commentRss><comments>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/strengthen-your-identity-fabric-to-protect-your-identity-ecosystem#comments</comments><description>Identity security didn&amp;rsquo;t suddenly fail us. It didn&amp;rsquo;t break. It just grew apart.
Many agile changes started as smart, necessary business decisions &amp;ndash; cloud adoption, remote work, SaaS acceleration, mergers and acquisitions &amp;ndash; all...(&lt;a href="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/strengthen-your-identity-fabric-to-protect-your-identity-ecosystem"&gt;read more&lt;/a&gt;)&lt;img src="https://www.oneidentity.com/community/aggbug?PostID=7086&amp;AppID=43&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/Identity%2bFabric%2bIdentity%2band%2bAccess%2bManagement">Identity Fabric Identity and Access Management</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/identity">identity</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/iam">iam</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/identity%2bsecurity">identity security</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/Unified%2bIdentity">Unified Identity</category></item><item><title>How agentic AI and non-human identities are transforming cybersecurity</title><link>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/how-agentic-ai-and-non-human-identities-are-transforming-cybersecurity</link><pubDate>Thu, 25 Sep 2025 15:51:29 GMT</pubDate><guid isPermaLink="false">5f2f4fa7-ebc7-4803-900c-42d427844a5e:73b21c00-b08a-4ab7-868f-ccac668c2f70</guid><dc:creator>Robert Kraczek</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.oneidentity.com/community/blogs/b/identity-governance-administration/rsscomments?WeblogPostID=7073</wfw:commentRss><comments>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/how-agentic-ai-and-non-human-identities-are-transforming-cybersecurity#comments</comments><description>Within the average enterprise,&amp;nbsp;&lt;a href="https://www.oneidentity.com/learn/what-are-non-human-identities-in-cybersecurity.aspx"&gt;non-human identities&amp;nbsp;(NHIs)&lt;/a&gt; now outnumber employees, contractors, and customers by anything between 10-to-1 and 92-to-1.
Add to this the fragmentation of human identity management resulting from authorizing a ...(&lt;a href="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/how-agentic-ai-and-non-human-identities-are-transforming-cybersecurity"&gt;read more&lt;/a&gt;)&lt;img src="https://www.oneidentity.com/community/aggbug?PostID=7073&amp;AppID=43&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/Non%2bHuman%2bIdentities">Non Human Identities</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/Identity%2bGovernance">Identity Governance</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/cybersecurity">cybersecurity</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/IGA">IGA</category></item><item><title>Understanding non-human identity management: Lessons from a PeerSpot One Identity use case</title><link>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/understanding-non-human-identity-management-lessons-from-a-peerspot-one-identity-use-case</link><pubDate>Tue, 16 Sep 2025 15:49:50 GMT</pubDate><guid isPermaLink="false">5f2f4fa7-ebc7-4803-900c-42d427844a5e:5d80af44-4b9a-49b7-a914-e91ef0f9d8f0</guid><dc:creator>PeerSpot</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.oneidentity.com/community/blogs/b/identity-governance-administration/rsscomments?WeblogPostID=7068</wfw:commentRss><comments>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/understanding-non-human-identity-management-lessons-from-a-peerspot-one-identity-use-case#comments</comments><description>The management of non-human identities (NHI) presents unique challenges that many identity and access management professionals. Learn more from this case study conducted by PeerSpot and One Identity.(&lt;a href="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/understanding-non-human-identity-management-lessons-from-a-peerspot-one-identity-use-case"&gt;read more&lt;/a&gt;)&lt;img src="https://www.oneidentity.com/community/aggbug?PostID=7068&amp;AppID=43&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/identity%2bmanager">identity manager</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/NHI">NHI</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/NHI%2bManagement">NHI Management</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/IGA">IGA</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/identity%2bmanagement">identity management</category></item><item><title>Using ITDR to Protect Non-Human Identities</title><link>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/using-itdr-to-protect-non-human-identities</link><pubDate>Mon, 04 Aug 2025 17:21:55 GMT</pubDate><guid isPermaLink="false">5f2f4fa7-ebc7-4803-900c-42d427844a5e:0bcf431d-87d0-4df7-836d-ca3ddf683b55</guid><dc:creator>One Identity</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.oneidentity.com/community/blogs/b/identity-governance-administration/rsscomments?WeblogPostID=7060</wfw:commentRss><comments>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/using-itdr-to-protect-non-human-identities#comments</comments><description>Non-human identities. It seems like every technology conference that I&amp;rsquo;ve attended over the past year or so has had NHIs as a primary topic. And it&amp;rsquo;s no wonder. What have become powerful tools in the new world of hyper-automation, dynamic...(&lt;a href="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/using-itdr-to-protect-non-human-identities"&gt;read more&lt;/a&gt;)&lt;img src="https://www.oneidentity.com/community/aggbug?PostID=7060&amp;AppID=43&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/Non%2bHuman%2bIdentities">Non Human Identities</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/identity%2bmanager">identity manager</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/Identity%2bGovernance">Identity Governance</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/NHI">NHI</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/Threat%2bDetection">Threat Detection</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/IGA">IGA</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/ITDR">ITDR</category></item><item><title>Why are non-human identities suddenly such a big deal?</title><link>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/why-are-non-human-identities-suddenly-such-a-big-deal</link><pubDate>Fri, 18 Jul 2025 17:29:55 GMT</pubDate><guid isPermaLink="false">5f2f4fa7-ebc7-4803-900c-42d427844a5e:d1a161d1-27f6-48d5-beca-e2653bef07d5</guid><dc:creator>Robert Kraczek</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.oneidentity.com/community/blogs/b/identity-governance-administration/rsscomments?WeblogPostID=7055</wfw:commentRss><comments>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/why-are-non-human-identities-suddenly-such-a-big-deal#comments</comments><description>A new concept in the world of IT: the non-human identity. Learn why it&amp;#39;s trending and how it differs from other bot management and machine identity systems.(&lt;a href="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/why-are-non-human-identities-suddenly-such-a-big-deal"&gt;read more&lt;/a&gt;)&lt;img src="https://www.oneidentity.com/community/aggbug?PostID=7055&amp;AppID=43&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/Non%2bHuman%2bIdentities">Non Human Identities</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/identity%2bmanager">identity manager</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/NHI">NHI</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/identity%2bsecurity">identity security</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/AI">AI</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/IGA">IGA</category></item><item><title>AI – More Than a Buzzword?</title><link>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/ai-more-than-a-buzzword</link><pubDate>Fri, 30 May 2025 18:08:29 GMT</pubDate><guid isPermaLink="false">5f2f4fa7-ebc7-4803-900c-42d427844a5e:dd8720d2-ae84-42c8-a4b6-8a1bfb457fc5</guid><dc:creator>Josh Karnes</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.oneidentity.com/community/blogs/b/identity-governance-administration/rsscomments?WeblogPostID=7043</wfw:commentRss><comments>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/ai-more-than-a-buzzword#comments</comments><description>Lately, the common theme in emerging &lt;a href="https://www.oneidentity.com/learn/what-is-identity-security.aspx"&gt;identity security&lt;/a&gt; technology has been&amp;hellip; well, you know. AI. It&amp;rsquo;s all anyone wants to talk about. All of us in the IAM business have been scurrying to find a way to tell our customers and the market tha...(&lt;a href="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/ai-more-than-a-buzzword"&gt;read more&lt;/a&gt;)&lt;img src="https://www.oneidentity.com/community/aggbug?PostID=7043&amp;AppID=43&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/IGA">IGA</category></item><item><title>Compliant until breached: The case for Digital Identity</title><link>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/compliant-until-breached-the-case-for-digital-identity</link><pubDate>Thu, 20 Feb 2025 18:56:52 GMT</pubDate><guid isPermaLink="false">5f2f4fa7-ebc7-4803-900c-42d427844a5e:2ea93bc1-e985-4850-8e99-17ae2e74121f</guid><dc:creator>Robert Byrne</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.oneidentity.com/community/blogs/b/identity-governance-administration/rsscomments?WeblogPostID=7023</wfw:commentRss><comments>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/compliant-until-breached-the-case-for-digital-identity#comments</comments><description>Why is breach compliance important for organizations? If companies complying with their regulatory obligations, why are they still being breached? (&lt;a href="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/compliant-until-breached-the-case-for-digital-identity"&gt;read more&lt;/a&gt;)&lt;img src="https://www.oneidentity.com/community/aggbug?PostID=7023&amp;AppID=43&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/hack">hack</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/attack">attack</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/Network%2bSecurity">Network Security</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/one%2bidentity">one identity</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/IGA">IGA</category><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/identity%2bmanagement">identity management</category></item><item><title>Unify your identity platform: Address the IAM trends</title><link>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/unify-your-identity-platform-address-the-iam-trends</link><pubDate>Mon, 27 Jan 2025 18:16:59 GMT</pubDate><guid isPermaLink="false">5f2f4fa7-ebc7-4803-900c-42d427844a5e:2ede9471-22ac-4167-9b10-2b68e914c71c</guid><dc:creator>Bruce Esposito</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.oneidentity.com/community/blogs/b/identity-governance-administration/rsscomments?WeblogPostID=7018</wfw:commentRss><comments>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/unify-your-identity-platform-address-the-iam-trends#comments</comments><description>Streamline your identity platform to effectively address current Identity and Access Management (IAM) trends.(&lt;a href="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/unify-your-identity-platform-address-the-iam-trends"&gt;read more&lt;/a&gt;)&lt;img src="https://www.oneidentity.com/community/aggbug?PostID=7018&amp;AppID=43&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description></item><item><title>Behavior Driven Governance</title><link>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/behavior-driven-analytics</link><pubDate>Wed, 11 Dec 2024 17:47:35 GMT</pubDate><guid isPermaLink="false">5f2f4fa7-ebc7-4803-900c-42d427844a5e:e5be7b8f-5126-48ce-8072-f62aecd1deb0</guid><dc:creator>Bruce Esposito</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.oneidentity.com/community/blogs/b/identity-governance-administration/rsscomments?WeblogPostID=7001</wfw:commentRss><comments>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/behavior-driven-analytics#comments</comments><description>There&amp;rsquo;s an unfortunate truth about applications and access in the enterprise. Many applications are underutilized. This means patches and updates can fall down the to-do list of already-stretched IT service desks. Naturally, this increases the ...(&lt;a href="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/behavior-driven-analytics"&gt;read more&lt;/a&gt;)&lt;img src="https://www.oneidentity.com/community/aggbug?PostID=7001&amp;AppID=43&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description></item><item><title>Breach by Breach: Why Traditional IAM Is Now Obsolete</title><link>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/breach-by-breach-why-traditional-iam-is-now-obsolete</link><pubDate>Tue, 05 Nov 2024 20:24:31 GMT</pubDate><guid isPermaLink="false">5f2f4fa7-ebc7-4803-900c-42d427844a5e:fefd427a-c2b1-4fd2-8871-c7ca3cc88294</guid><dc:creator>Bruce Esposito</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.oneidentity.com/community/blogs/b/identity-governance-administration/rsscomments?WeblogPostID=6988</wfw:commentRss><comments>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/breach-by-breach-why-traditional-iam-is-now-obsolete#comments</comments><description>In many ways, identities are arguably now at the frontier of cybersecurity – which means traditional identity and access management (IAM) approaches are increasingly inadequate.(&lt;a href="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/breach-by-breach-why-traditional-iam-is-now-obsolete"&gt;read more&lt;/a&gt;)&lt;img src="https://www.oneidentity.com/community/aggbug?PostID=6988&amp;AppID=43&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description></item><item><title>Understanding Context-based requests for SAP in Identity Manager</title><link>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/understanding-context-based-requests-for-sap-in-identity-manager</link><pubDate>Thu, 15 Aug 2024 14:00:00 GMT</pubDate><guid isPermaLink="false">5f2f4fa7-ebc7-4803-900c-42d427844a5e:c4f680d7-013c-4cb5-8c55-aa714dc12327</guid><dc:creator>Abdullah Ahmad</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.oneidentity.com/community/blogs/b/identity-governance-administration/rsscomments?WeblogPostID=6934</wfw:commentRss><comments>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/understanding-context-based-requests-for-sap-in-identity-manager#comments</comments><description>Requesting an SAP role with Context is considered a Context-based request, and an end user has multiple options for creating a request.(&lt;a href="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/understanding-context-based-requests-for-sap-in-identity-manager"&gt;read more&lt;/a&gt;)&lt;img src="https://www.oneidentity.com/community/aggbug?PostID=6934&amp;AppID=43&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description></item><item><title>Introducing XIAM: A fresh approach to external identity and access management</title><link>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/introducing-xiam-a-fresh-approach-to-external-identity-and-access-management</link><pubDate>Wed, 14 Aug 2024 22:44:40 GMT</pubDate><guid isPermaLink="false">5f2f4fa7-ebc7-4803-900c-42d427844a5e:a900cbe3-3bfa-449f-8fdb-d86631ab2f64</guid><dc:creator>Josh Karnes</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.oneidentity.com/community/blogs/b/identity-governance-administration/rsscomments?WeblogPostID=6956</wfw:commentRss><comments>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/introducing-xiam-a-fresh-approach-to-external-identity-and-access-management#comments</comments><description>XIAM, which we have taken to pronouncing “zi-yam” described it as “External Identity and Access Management” is an IAM cybersecurity solution that is becoming more popular.(&lt;a href="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/introducing-xiam-a-fresh-approach-to-external-identity-and-access-management"&gt;read more&lt;/a&gt;)&lt;img src="https://www.oneidentity.com/community/aggbug?PostID=6956&amp;AppID=43&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description></item><item><title>Governing access to the Microsoft Dynamics estate</title><link>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/governing-access-to-the-microsoft-dynamics-estate</link><pubDate>Fri, 02 Aug 2024 17:24:00 GMT</pubDate><guid isPermaLink="false">5f2f4fa7-ebc7-4803-900c-42d427844a5e:642b1e06-2d69-4a48-beb6-095df99507ea</guid><dc:creator>Robert Byrne</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.oneidentity.com/community/blogs/b/identity-governance-administration/rsscomments?WeblogPostID=6945</wfw:commentRss><comments>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/governing-access-to-the-microsoft-dynamics-estate#comments</comments><description>ERP and CRM systems are key parts of an organization’s business infrastructure and digital transformation initiatives. One Identity and governing access to the microsoft dynamics estate.(&lt;a href="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/governing-access-to-the-microsoft-dynamics-estate"&gt;read more&lt;/a&gt;)&lt;img src="https://www.oneidentity.com/community/aggbug?PostID=6945&amp;AppID=43&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description></item><item><title>Tackling identity sprawl: The new scourge of IAM</title><link>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/tackling-identity-sprawl-the-new-scourge-of-iam</link><pubDate>Sat, 15 Jun 2024 03:30:20 GMT</pubDate><guid isPermaLink="false">5f2f4fa7-ebc7-4803-900c-42d427844a5e:f6645df1-f492-4f91-a0ac-98dfb9eaeb20</guid><dc:creator>Bruce Esposito</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.oneidentity.com/community/blogs/b/identity-governance-administration/rsscomments?WeblogPostID=6912</wfw:commentRss><comments>https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/tackling-identity-sprawl-the-new-scourge-of-iam#comments</comments><description>Learn what identity sprawl is, and why it is the new IAM scourge. Most definitions of ‘sprawl’ will include references to developing irregularly or carelessly, and without restraint.(&lt;a href="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/tackling-identity-sprawl-the-new-scourge-of-iam"&gt;read more&lt;/a&gt;)&lt;img src="https://www.oneidentity.com/community/aggbug?PostID=6912&amp;AppID=43&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description><category domain="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/archive/tags/Identity%2band%2bAccess%2bManagement">Identity and Access Management</category></item></channel></rss>