• Products
    • View all products
    • Free trials
    • Identity Governance and Administration
      • Identity Manager
      • Identity Manager Data Governance
      • Starling Connect
    • AD Account Lifecycle Management
      • Active Roles
      • Authentication Services
      • Starling Connect
      • Password Manager
    • Privileged Access Management
      • One Identity Safeguard
      • Safeguard Authentication Services
      • Safeguard for Privileged Analytics
      • Safeguard for Privileged Passwords
      • Safeguard for Privileged Sessions
      • Safeguard for Sudo
    • Access control
      • Defender
      • Starling Two-Factor Authentication
      • Password Manager
    • syslog-ng Log Management
  • Integrations
    • Integrations Overview
    • Cloud Infrastructure
    • Access Management
      • Ping
    • Applications
      • SAP
    • Privileged Access Management
      • Blue Prism
      • HashiCorp
    • Data
    • Compliance
  • Solutions
    • All Solutions
    • Secure the organization
    • Drive operational efficiencies
    • Enable compliance and auditing
    • Support digital transformation
    • Enhance log management
  • Resources
    • Blogs
      • Blogs A to Z
      • AD-Centered IAM
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Customer Stories
    • Documents
    • Events
    • Webcasts
    • Technical Documentation
    • Videos
    • Whitepapers
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
  • All tags
  • Active Directory
  • access management
  • Active Roles
  • Active Roles 7.1
  • ActiveRoles Server
  • automated Active Directory
  • Automated provisioning
  • Azure Active Directory
  • cybersecurity
  • events
  • iam
  • IAM Active Directory
  • IAM solutions
  • Identity and Access Management
  • Identity Governance
  • identity management
  • one identity
  • One Identity Safeguard
  • Product Releases &amp
  • provisioning
  • Security
  • Starling Connect
  • Support
  • Technical
  • updates
  • Zero Trust Model
  • Common Active Directory attacks

    Do you know how to stop the seven most common Active Directory attack methods?

    One Identity
    One Identity

    How do you protect your organization from Active Directory attacks?

    With over 95 percent of the Fortune 1000 companies relying on Microsoft Active Directory (AD) and Azure AD for authentication and single-sign-on support for their user populations, it…

    • 5 months ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Active Directory management tools

    The Advantages of Using Active Directory Management Tools

    Robert Kraczek
    Robert Kraczek

    Active Directory (AD) and, more recently, Azure AD have become the de-facto standard for most organizations for controlling what their users have access to and how information flows, depending on memberships within the organizational structure. Some organizations…

    • 6 months ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Better Together Podcast Series - Microsoft Active Directory security and One Identity Active Roles best practices

    Fences, guard dogs, Zero Trust and Active Directory security

    Daniel.Conrad
    Daniel.Conrad

     
    The Zero Trust model introduces a fundamental shift to an organization’s security strategy. From the outset, a Zero Trust model assumes that attackers will get in rather than solely focusing on keeping attackers at bay outside of a perimeter. Don’t get…

    • 7 months ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Active directory best practices

    10 Active Directory Best Practices to Enhance Security and Performance

    Robert Sandri
    Robert Sandri

    10 Active Directory Best Practices to Enhance Security and Performance  

    You may think that Active Directory and Azure Active Directory stand on their own, so Active Directory best practices are redundant. On their own, Microsoft Active Directory (AD)…

    • 9 months ago
    • Blogs
    • One Identity
  • What is an attack surface?

    What is an attack surface? A definition and best practices to reduce it

    One Identity
    One Identity

    What is an attack surface and what best practices can help to minimize it? Cyberattacks and data breaches are incredibly expensive and can cause customers to lose confidence in a business. It’s in every organization’s best interest to limit those risks…

    • over 1 year ago
    • Blogs
    • One Identity
  • How do security-minded organizations approach Zero Trust?

    How do security-minded organizations approach Zero Trust?

    Megan Pennie
    Megan Pennie

    Interest in Zero Trust and identity security technologies is surging for IT leaders worldwide as breaches and targeted threats increase for organizations worldwide. Many wonder if they are making the right investments in security solutions to enable Zero Trust security…

    • over 1 year ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • One Identity Resilience - Partner and User Conference, Identity-centric security

    One Identity Resilience: New Name, New Priorities, New Level of Strength & Unity

    Patrick Hunter
    Patrick Hunter

    United in our resilience.

    We stood together, Customers, Partners and One Identity, united in a common cause. We stood arm-in-arm alongside our fellows and have recently faced one of the biggest challenges the globe has thrown at us in modern times. Not…

    • over 1 year ago
    • Blogs
    • One Identity
  • 10 Best Practices to Secure Active Directory – From Real Users of One Identity Active Roles

    10 Best Practices to Secure Active Directory – From Real Users of One Identity Active Roles

    Megan Pennie
    Megan Pennie

    Account Lifecycle Management programs have transformed since the pandemic, and we heard from IT thought leaders and real users that they must make great strides to increase Active Directory (AD) security and efficiency to handle the digital transformation…

    • over 1 year ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • 2020 Tech Hangover Recovery - Expert Panelists Provide Informed Insights to Reinforce and Secure

    2020 Tech Hangover Recovery - Expert Panelists Provide Informed Insights to Reinforce and Secure

    Megan Pennie
    Megan Pennie

    What does the future of security hold? Is Zero Trust a real thing? Is a secure environment achievable for organizations, especially with the aftershocks from 2020? In this on-demand webcast, Cure the 2020 Tech Hangover, our lively panel of experts address…

    • over 1 year ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Three Ways to Improve Password Security and Self-service for Your End Users

    Three Ways to Improve Password Security and Self-service for Your End Users

    Megan Pennie
    Megan Pennie

    For enhanced password security, organizations need a simple, highly secure and efficient way for users to reset forgotten passwords and unlock accounts on their own. As an IT Leader, you must implement strong password policies and eliminate risk of data…

    • over 1 year ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Achieve Zero Trust Even When Active Directory is in the Way

    Achieve Zero Trust Even When Active Directory is in the Way

    Daniel.Conrad
    Daniel.Conrad

    After working with Active Directory for longer than I care to confess, the term ‘Zero Trust’ has bubbled up just about everywhere I look. For years, I ignored it, mostly because it sounds too good to be true. I assumed – as with some industry buzzwords…

    • over 1 year ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Secure Privileged Access in a Hybrid Active Directory World

    Secure Privileged Access in a Hybrid Active Directory World

    Megan Pennie
    Megan Pennie

    The ubiquitous use of Microsoft Active Directory (AD) and Azure AD in 95 percent of the global Fortune 1000 companies make it the primary target of cyberattacks. Now, as more and more organizations integrate their Privileged Access Management (PAM) into…

    • over 2 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • KuppingerCole Executive View on One Identity Active Roles

    KuppingerCole Executive View on One Identity Active Roles

    Megan Pennie
    Megan Pennie

    With Microsoft Active Directory (AD) and Azure Active Directory (AAD) in 95 percent of Fortune 1000 organizations worldwide, the hybrid AD environment is a huge target for cyberattacks. It’s a challenge to manage and secure AD/AAD account lifecycle management…

    • over 2 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Are we bouncing back or adjusting to a new way to work?

    Are we bouncing back or adjusting to a new way to work?

    Daniel.Conrad
    Daniel.Conrad

    As most companies and organizations adjusted to the abrupt change, I must admit that I missed some of the challenges they were facing. Our company, One Identity – which is a Quest Software business, was probably more prepared than most since a good portion…

    • over 2 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Welcome to My World – How to Easily Handle a Sudden Storm of Active Directory Provisioning Tasks

    Welcome to My World – How to Easily Handle a Sudden Storm of Active Directory Provisioning Tasks

    One Identity
    One Identity

    This current global health crisis has created chaos and hardship for individuals, families, companies and governments. With events canceled or postponed, offices closed and personal routines put on hold, life as we previously knew it, quickly changed…

    • over 2 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Bouncing Back from Forced Change – the Active Directory Angle

    Bouncing Back from Forced Change – the Active Directory Angle

    Todd Peterson
    Todd Peterson

    As you know, recent events forced nearly every organization in the world to quickly adjust the status of its workforce. Whether it was to transition office-based workers to remote access, to temporarily furlough employees with the intent to bring them…

    • over 2 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • You Can Live a Dual Life – Use Cases and Solutions for a Hybrid World

    You Can Live a Dual Life – Use Cases and Solutions for a Hybrid World

    mlfrance
    mlfrance

    Hannah Montana was right: you can have the best of both worlds. Though the late 2000s teen queen was singing about her secret double life as a high-flying pop star and a down-to-earth high school student, it turns out that that life goal now also applies…

    • over 3 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Can Pauline Find Productivity without AD-Centered Identity Management?

    Can Pauline Find Productivity without AD-Centered Identity Management?

    Todd Peterson
    Todd Peterson

    Which introductory experience do new hires to your organization get? Are they able to login on their first day and access all necessary resources to do their basic job? Or… are they temporarily assigned a left-over cubicle with no phone, computer or network…

    • over 3 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Starling Connect extends your identity administration and governance capabilities to the cloud

    Starling Connect extends your identity administration and governance capabilities to the cloud

    Todd Peterson
    Todd Peterson

    You already know the amazing capabilities of One Identity Active Roles and how it simplifies and centralizes provisioning and deprovisioning processes for your Active Directory and Azure Active Directory-controlled identities. You know that it provides…

    • over 3 years ago
    • Blogs
    • Cloud
  • Upgrade to Awesome with Identity Manager - Part One

    Michael.Pierson
    Michael.Pierson

    Upgrade from Identity Manager 6.x - Synchronization

    Welcome to the first installment of our Upgrade to Awesome blog series, in it we'll take a look at the performance boost in version 7 connectors. This is important to understand as we prepare for the…

    • over 5 years ago
    • Blogs
    • Identity Governance & Administration
  • Another Organization Gets IAM Right!

    Todd Peterson
    Todd Peterson

    Here at One Identity, we like to highlight organizations that figure it out and finally get IAM right. There are so many that struggle to achieve the security, automation, and transformation that IAM can deliver, that when someone pulls it off, we like…

    • over 5 years ago
    • Blogs
    • Identity Governance & Administration
  • EIC17 Day 1 – Are We #GetIAMRight?

    Alessandro Festa
    Alessandro Festa

    I’m here at the Kuppingercole EIC17 conference and it’s Day 1. As always there’s that mix of first day of school after summer holidays and “new kids on the block” for those who attend the conference for the very first time.…

    • over 5 years ago
    • Blogs
    • Identity Governance & Administration
  • Join our April 19th Breakfast Event: Overcome native AD management tool limitations

    Join our April 19th Breakfast Event: Overcome native AD management tool limitations

    Danielle.Vorce
    Danielle.Vorce

    Join us April 19th for our breakfast event "Overcome Native AD Management Tool Limitations" at Privé Cafe at Marina at Keppel Bay in Singapore from 8am-11am GMT.

    Active Directory, simple and secure

    The capabilities of native Active…

    • over 5 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Active Roles 7.1 – Automation for On-Prem AD and Azure AD

    Active Roles 7.1 – Automation for On-Prem AD and Azure AD

    David.Miles
    David.Miles

    Using the single, familiar Active Roles interface, there is no longer a need to be constantly switching between consoles, and writing complex scripts in an attempt to automate, because Active Roles does it for you. 

    Creation of a user, for example, can…

    • over 5 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • How Active Roles 7.1 Interfaces With Both On-Prem and Azure AD

    How Active Roles 7.1 Interfaces With Both On-Prem and Azure AD

    David.Miles
    David.Miles

    With version 7.1, the One Identity Active Roles solution has expanded its scope to cover both on-prem AD (as its always done) and Azure AD. Here’s an explanation of how it works.

    The ADSI provider serves as the interface between the Active Roles…

    • over 5 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • View related content from anywhere
  • More
  • Cancel
>
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2023 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center