• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
  • All tags
  • Active Directory
  • access management
  • Active Directory Management
  • Active Roles
  • Active Roles 7.1
  • ActiveRoles Server
  • Azure Active Directory
  • cybersecurity
  • events
  • iam
  • IAM Active Directory
  • IAM solutions
  • Identity and Access Management
  • Identity Governance
  • Identity Governance and Administration
  • identity management
  • one identity
  • Product Releases &amp
  • provisioning
  • Security
  • Starling Connect
  • Support
  • Technical
  • updates
  • Zero Trust
  • Zero Trust Model
  • securing non human identities in hybrid environments

    Securing non-human identities in hybrid environments

    Vipin Jain
    Vipin Jain

    Securing non-human identities is just as critical as managing human ones in today's complex IT landscapes. Non-human identities, such as service accounts, application identities, and IoT devices, play pivotal roles in automation and system integration…

    • 9 months ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Why you need Active Roles, even if you have IGA

    Why you need Active Roles, even if you have IGA

    AJ Lindner
    AJ Lindner

    Here are two scenarios I come across frequently, with customers of all sizes, in all industries, when discussing One Identity Active Roles:

    1. “We have an IGA solution. It already manages our Active Directory just fine. Why do I need this?”
    …
    • over 1 year ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • How to find and manage privileged accounts in Active Directory (AD)

    How to find and manage privileged accounts in Active Directory

    Eric Hibar Jr.
    Eric Hibar Jr.

    When it comes to securing Active Directory, the first place to start is usually getting a handle on what currently exists - getting a ‘lay of the land,’ so to speak. In Active Directory, the admincount attribute can play a role in identifying privileged…

    • over 1 year ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Common Active Directory attacks

    Do you know how to stop the seven most common Active Directory attack methods?

    One Identity
    One Identity

    How do you protect your organization from Active Directory attacks?

    With over 95 percent of the Fortune 1000 companies relying on Microsoft Active Directory (AD) and Azure AD for authentication and single-sign-on support for their user populations, it…

    • over 2 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Active Directory management tools

    The Advantages of Using Active Directory Management Tools

    Robert Kraczek
    Robert Kraczek

    Active Directory (AD) and, more recently, Azure AD have become the de-facto standard for most organizations for controlling what their users have access to and how information flows, depending on memberships within the organizational structure. Some organizations…

    • over 2 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Better Together Podcast Series - Microsoft Active Directory security and One Identity Active Roles best practices

    Fences, guard dogs, Zero Trust and Active Directory security

    Daniel.Conrad
    Daniel.Conrad

     
    The Zero Trust model introduces a fundamental shift to an organization’s security strategy. From the outset, a Zero Trust model assumes that attackers will get in rather than solely focusing on keeping attackers at bay outside of a perimeter. Don’t get…

    • over 2 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Active directory best practices

    10 Active Directory Best Practices to Enhance Security and Performance

    Robert Sandri
    Robert Sandri

    10 Active Directory Best Practices to Enhance Security and Performance  

    You may think that Active Directory and Azure Active Directory stand on their own, so Active Directory best practices are redundant. On their own, Microsoft Active Directory (AD)…

    • over 3 years ago
    • Blogs
    • One Identity
  • What is an attack surface?

    What is an attack surface? A definition and best practices to reduce it

    One Identity
    One Identity

    What is an attack surface and what best practices can help to minimize it? Cyberattacks and data breaches are incredibly expensive and can cause customers to lose confidence in a business. It’s in every organization’s best interest to limit those risks…

    • over 3 years ago
    • Blogs
    • One Identity
  • How do security-minded organizations approach Zero Trust?

    How do security-minded organizations approach Zero Trust?

    Megan Pennie
    Megan Pennie

    Interest in Zero Trust and identity security technologies is surging for IT leaders worldwide as breaches and targeted threats increase for organizations worldwide. Many wonder if they are making the right investments in security solutions to enable Zero Trust security…

    • over 3 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • One Identity Resilience - Partner and User Conference, Identity-centric security

    One Identity Resilience: New Name, New Priorities, New Level of Strength & Unity

    Patrick Hunter
    Patrick Hunter

    United in our resilience.

    We stood together, Customers, Partners and One Identity, united in a common cause. We stood arm-in-arm alongside our fellows and have recently faced one of the biggest challenges the globe has thrown at us in modern times. Not…

    • over 3 years ago
    • Blogs
    • One Identity
  • 10 Best Practices to Secure Active Directory – From Real Users of One Identity Active Roles

    10 Best Practices to Secure Active Directory – From Real Users of One Identity Active Roles

    Megan Pennie
    Megan Pennie

    Account Lifecycle Management programs have transformed since the pandemic, and we heard from IT thought leaders and real users that they must make great strides to increase Active Directory (AD) security and efficiency to handle the digital transformation…

    • over 3 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • 2020 Tech Hangover Recovery - Expert Panelists Provide Informed Insights to Reinforce and Secure

    2020 Tech Hangover Recovery - Expert Panelists Provide Informed Insights to Reinforce and Secure

    Megan Pennie
    Megan Pennie

    What does the future of security hold? Is Zero Trust a real thing? Is a secure environment achievable for organizations, especially with the aftershocks from 2020? In this on-demand webcast, Cure the 2020 Tech Hangover, our lively panel of experts address…

    • over 4 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Three Ways to Improve Password Security and Self-service for Your End Users

    Three Ways to Improve Password Security and Self-service for Your End Users

    Megan Pennie
    Megan Pennie

    For enhanced password security, organizations need a simple, highly secure and efficient way for users to reset forgotten passwords and unlock accounts on their own. As an IT Leader, you must implement strong password policies and eliminate risk of data…

    • over 4 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Achieve Zero Trust Even When Active Directory is in the Way

    Achieve Zero Trust Even When Active Directory is in the Way

    Daniel.Conrad
    Daniel.Conrad

    After working with Active Directory for longer than I care to confess, the term ‘Zero Trust’ has bubbled up just about everywhere I look. For years, I ignored it, mostly because it sounds too good to be true. I assumed – as with some industry buzzwords…

    • over 4 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Secure Privileged Access in a Hybrid Active Directory World

    Secure Privileged Access in a Hybrid Active Directory World

    Megan Pennie
    Megan Pennie

    The ubiquitous use of Microsoft Active Directory (AD) and Azure AD in 95 percent of the global Fortune 1000 companies make it the primary target of cyberattacks. Now, as more and more organizations integrate their Privileged Access Management (PAM) into…

    • over 4 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • KuppingerCole Executive View on One Identity Active Roles

    KuppingerCole Executive View on One Identity Active Roles

    Megan Pennie
    Megan Pennie

    With Microsoft Active Directory (AD) and Azure Active Directory (AAD) in 95 percent of Fortune 1000 organizations worldwide, the hybrid AD environment is a huge target for cyberattacks. It’s a challenge to manage and secure AD/AAD account lifecycle management…

    • over 4 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Are we bouncing back or adjusting to a new way to work?

    Are we bouncing back or adjusting to a new way to work?

    Daniel.Conrad
    Daniel.Conrad

    As most companies and organizations adjusted to the abrupt change, I must admit that I missed some of the challenges they were facing. Our company, One Identity – which is a Quest Software business, was probably more prepared than most since a good portion…

    • over 4 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Welcome to My World – How to Easily Handle a Sudden Storm of Active Directory Provisioning Tasks

    Welcome to My World – How to Easily Handle a Sudden Storm of Active Directory Provisioning Tasks

    One Identity
    One Identity

    This current global health crisis has created chaos and hardship for individuals, families, companies and governments. With events canceled or postponed, offices closed and personal routines put on hold, life as we previously knew it, quickly changed…

    • over 4 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Bouncing Back from Forced Change – the Active Directory Angle

    Bouncing Back from Forced Change – the Active Directory Angle

    Todd Peterson
    Todd Peterson

    As you know, recent events forced nearly every organization in the world to quickly adjust the status of its workforce. Whether it was to transition office-based workers to remote access, to temporarily furlough employees with the intent to bring them…

    • over 5 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • You Can Live a Dual Life – Use Cases and Solutions for a Hybrid World

    You Can Live a Dual Life – Use Cases and Solutions for a Hybrid World

    mlfrance
    mlfrance

    Hannah Montana was right: you can have the best of both worlds. Though the late 2000s teen queen was singing about her secret double life as a high-flying pop star and a down-to-earth high school student, it turns out that that life goal now also applies…

    • over 5 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Can Pauline Find Productivity without AD-Centered Identity Management?

    Can Pauline Find Productivity without AD-Centered Identity Management?

    Todd Peterson
    Todd Peterson

    Which introductory experience do new hires to your organization get? Are they able to login on their first day and access all necessary resources to do their basic job? Or… are they temporarily assigned a left-over cubicle with no phone, computer or network…

    • over 5 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Starling Connect extends your identity administration and governance capabilities to the cloud

    Starling Connect extends your identity administration and governance capabilities to the cloud

    Todd Peterson
    Todd Peterson

    You already know the amazing capabilities of One Identity Active Roles and how it simplifies and centralizes provisioning and deprovisioning processes for your Active Directory and Azure Active Directory-controlled identities. You know that it provides…

    • over 5 years ago
    • Blogs
    • Cloud
  • Upgrade to Awesome with Identity Manager - Part One

    Michael.Pierson
    Michael.Pierson

    Upgrade from Identity Manager 6.x - Synchronization

    Welcome to the first installment of our Upgrade to Awesome blog series, in it we'll take a look at the performance boost in version 7 connectors. This is important to understand as we prepare for the…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Another Organization Gets IAM Right!

    Todd Peterson
    Todd Peterson

    Here at One Identity, we like to highlight organizations that figure it out and finally get IAM right. There are so many that struggle to achieve the security, automation, and transformation that IAM can deliver, that when someone pulls it off, we like…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • EIC17 Day 1 – Are We #GetIAMRight?

    Alessandro Festa
    Alessandro Festa

    I’m here at the Kuppingercole EIC17 conference and it’s Day 1. As always there’s that mix of first day of school after summer holidays and “new kids on the block” for those who attend the conference for the very first time.…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • View related content from anywhere
  • More
  • Cancel
>
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center