• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
  • All tags
  • access management
  • Active Directory
  • Active Roles
  • Active Roles 7.1
  • ActiveRoles Server
  • Cloud
  • cloud access manager
  • Customer Success
  • events
  • governance
  • iam
  • IAM Active Directory
  • IAM solutions
  • Identity and Access Management
  • Identity Governance
  • identity provisioning
  • one identity
  • OneLogin
  • Partners
  • privileged access management
  • Product Releases &amp
  • Security
  • Support
  • Technical
  • Thought Leadership
  • updates
  • Why cyber insurance should be part of any comprehensive risk management strategy

    Why cyber insurance should be part of any comprehensive risk management strategy

    darren thomson
    darren thomson

    Introduction

    The recent rise of ransomware, attacks on supply chains and increasing costliness of privacy regulations has made cyber insurance an important topic of discussion. But it can be tricky to keep up with cyber insurance requirements. One of…

    • over 1 year ago
    • Blogs
    • One Identity
  •  integrated Access Management and IGA in behavior driven govnernance

    Breaking Down Silos: Why integrated Access Management and IGA is crucial for modern organizations

    Josh Karnes
    Josh Karnes

    Identity and Access Management (IAM) in most organizations is typically provided by Access Management, Privileged Access Management (PAM) and Identity Governance and Administration (IGA) solutions. Unfortunately, many of these solutions work independently…

    • over 2 years ago
    • Blogs
    • Identity Governance & Administration
  • 3 big problems enterprises encounter by using active directory without access management

    Three big problems enterprises encounter by using Active Directory without access management

    One Identity
    One Identity

    Active Directory is often the backbone of organizational IT teams.  From provisioning users, devices and recording permissions for access to network resources, Active Directory serves to manage user roles and make it easier for IT teams to maintain organizational…

    • over 2 years ago
    • Blogs
    • One Identity
  • access management

    OneLogin recognized as an access management Leader by KuppingerCole

    noelle mendez villamil
    noelle mendez villamil

    What is Access Management and Why is it Important? 

    Access Management (AM) ensures that the right people and job roles in your organization (identities) can access the tools they need to do their jobs. AM is critical to providing: 

    • Online Security: Traditional…
    • over 2 years ago
    • Blogs
    • One Identity
  • application onboarding a critical need in identity governance

    Application Onboarding: A Critical Need in Identity Governance

    Ted Ernst
    Ted Ernst

    What is application onboarding? It is the deployment of software and the granting of user access with the proper permissions and roles defined. More importantly, it is putting that application under the control of an identity governance product or process…

    • over 3 years ago
    • Blogs
    • Identity Governance & Administration
  • The Power of One: How Convergence Will Benefit the Identity Security Market

    The Power of One: How Convergence Will Benefit the Identity Security Market

    Joe Garber
    Joe Garber

    On Oct 4, One Identity announced that it had acquired OneLogin, bringing these two storied entities together as one. 

    Analysts and thought leaders have predicted consolidation in the space for some time. CISOs certainly have incentive to minimize the number…

    • over 3 years ago
    • Blogs
    • One Identity
  • Switch to secure password policies without drowning in support calls

    Switch to secure password policies without drowning in support calls

    Csaba Galffy
    Csaba Galffy

    As the global pandemic prompted organizations worldwide to implement huge work-from-home programs, we reached out to offer help with securing the newly created remote-access channels with multifactor authentication (MFA) through our Defender product.…

    • over 4 years ago
    • Blogs
    • Privileged Access Management
  • Is Active Directory obsolete?

    Is Active Directory obsolete?

    Daniel.Conrad
    Daniel.Conrad

    What’s all this talk about Active Directory being obsolete?

    You may have heard rumblings that Microsoft Active Directory – lovingly acronymed as ‘AD’ – is “becoming obsolete and should be replaced”. You may have also heard that “you should reduce…

    • over 4 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Global Survey – Are contractors following access rules and what are they viewing?

    Global Survey – Are contractors following access rules and what are they viewing?

    One Identity
    One Identity

    The modern business world doesn’t go around without them: contractors, outsourced service providers and partners. Collectively known as third parties, they can be outside developers, business consultants, freelancers or partners who must connect to your…

    • over 5 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Authentication factors: any number over 1 is good!

    Authentication factors: any number over 1 is good!

    csaba.galffy
    csaba.galffy

    It's October, so it's National Cybersecurity Awareness Month! And one of the main themes for this year's edition is multi-factor authentication: login protection by using more authentication factors than just the password. The second factor could be a…

    • over 5 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • With Identity Manager, university's research data is protected

    Laureen.Smith
    Laureen.Smith

    The IT department of Radboud University (the Netherlands) manages 40,000 to 50,000 identities. With around 25,000, the school also has an academic hospital, with faculty and staff, along with researchers from all over the world, not to mention invited…

    • over 5 years ago
    • Blogs
    • Identity Governance & Administration
  • Bakersfield Police Dept Locks Down Remote Access with Defender

    Laureen.Smith
    Laureen.Smith

    Read more about how the City of Bakersfield handles the increased use of mobile devices by the city’s police department and other field personnel.

    Recently, I spent a few great days at Gartner Security Summit 2016. At security events like this,…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • How Is the PIV Effort Really Going? It's More Than a Desktop Challenge

    Jeffrey Honeyman
    Jeffrey Honeyman

    I spend my days working with and for Federal Government agencies helping solve identity management challenges.  Always (now) with an eye toward security, I feel their pain in balancing the functionality needs of their enterprises with the security that…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • One Identity UNITE Partner Conference in Malta to Provide Engaging and Rewarding Experience

    Andrew.Clarke
    Andrew.Clarke

    In recent years, Malta has been a setting for many movies and TV series – the landscape and scenery providing a superb back-drop for many tales. One recent TV series that has filmed in Malta is the Game of Thrones.

    In our industry, we are living…

    • over 7 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Government agencies & Security Breaches: One City Shows How to #GetIAMRight

    Laureen.Smith
    Laureen.Smith

    The challenges of identity and access management (IAM) – namely ensuring that the right people, have the right access, to the rights systems, in all the right ways – is difficult in most organizations, but even more so in local governments. With a wide…

    • over 7 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Telecommunications giant secures Active Directory

    Laureen.Smith
    Laureen.Smith

    https://www.youtube.com/watch?v=w96686f9Rug

    As companies grow by acquisition and expand internationally, one of the natural by-products is a large and complex IT infrastructure.

    Such was the case with Telefónica España and its multi-domain use of Active…

    • over 7 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Hardware, Software or Out-Of-Band What's the Latest Trend for Two-Factor Authentication?

    Hardware, Software or Out-Of-Band What's the Latest Trend for Two-Factor Authentication?

    David.Miles
    David.Miles

    Most of us know what Two Factor Authentication is after all it has been with us for over 25 years. But while we have all been busy things have been changing slowly and steadily, especially when it comes to choosing whether to deploy hardware, software…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Active Roles complements ANY Identity Solution

    Bryan.Patton
    Bryan.Patton

    Provisioning.

    Workflow.

    Policies.

    When these words come up people suddenly have a thought in their mind defining its meaning. Many Identity Management products sound the same, One identity even has multiple products that may use the same words to describe…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • In conversation with a One Identity Partner: Core Technology Systems (UK)

    In conversation with a One Identity Partner: Core Technology Systems (UK)

    Andrew.Clarke
    Andrew.Clarke

    We recently had the opportunity to host an interview with Tim Eichmann, Head of Cloud & Infrastructure at Core Technology Systems (UK) Limited and One Identity.

    Core Technology Systems (UK) Limited help organisations large and small to achieve their…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Solving the initial password dilemma

    Solving the initial password dilemma

    Jorge Lopez Miranda
    Jorge Lopez Miranda

    Many times companies use an initial password that is partially or completely static (Summer2017?), or sometimes they use a formula which includes partial data of the user such as the month of birth + the three final digits of their Social Security, etc…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • How to Secure Confidential Attributes with Active Roles -Script Provided

    How to Secure Confidential Attributes with Active Roles -Script Provided

    Matthew Vinton
    Matthew Vinton

    The Challenge

    The Challenge

    Active Roles Access Templates are a terrific way of delegating access to Active Directory. They make securing Active Directory both simpler and more powerful. Access Templates can secure Active Directory at the object, attribute…

    • over 7 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Conquer the challenges of Office 365, Azure AD and Hybrid AD management

    Conquer the challenges of Office 365, Azure AD and Hybrid AD management

    Daniel Gauntner
    Daniel Gauntner

    Organizations are sprinting to Office 365. In fact, users will have to convert by Oct. 13, 2020 as support for Office 2020 ceases that day. By then, many organizations will be 100-percent cloud, but most are so heavily invested in legacy infrastructure…

    • over 7 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Active Roles 7.1 – Automation for On-Prem AD and Azure AD

    Active Roles 7.1 – Automation for On-Prem AD and Azure AD

    David.Miles
    David.Miles

    Using the single, familiar Active Roles interface, there is no longer a need to be constantly switching between consoles, and writing complex scripts in an attempt to automate, because Active Roles does it for you. 

    Creation of a user, for example, can…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • How Active Roles 7.1 Interfaces With Both On-Prem and Azure AD

    How Active Roles 7.1 Interfaces With Both On-Prem and Azure AD

    David.Miles
    David.Miles

    With version 7.1, the One Identity Active Roles solution has expanded its scope to cover both on-prem AD (as its always done) and Azure AD. Here’s an explanation of how it works.

    The ADSI provider serves as the interface between the Active Roles…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Introducing Active Roles 7.1 – The Management and Security Solution for Hybrid AD

    Introducing Active Roles 7.1 – The Management and Security Solution for Hybrid AD

    David.Miles
    David.Miles

    Over the past couple of years Azure Active Directory and Office 365 have been quietly and steadily gaining ground within our businesses. While many administrators have been busy managing their environments, the level of effort involved in their daily…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • View related content from anywhere
  • More
  • Cancel
>
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center