Bolster your security posture for your Active Directory environment. One Identity makes Zero Trust security a reality with the award-winning integration of Active Roles and Safeguard by One Identity.
What is Zero Trust and how can it be applied in an Active Directory world? See how transcends solutions and is a change in how security is perceived. Watch this video to learn more.
Learn how Active Roles can manage cloud-based systems using the “easy button” of Starling Connect and/or the SCIM standard. This session will cover provisioning to cloud-based applications and from SCIM compliant applications with Starling Connect.
For organizations moving to the cloud, the security and account lifecycle management of their environments is critical but challenging. In this session, we'll cover how Active Roles positions you for cloud-readiness, share options for deploying on prem vs. in the cloud, and cover Azure and AWS uses. Learn how Active Roles delivers the support and power needed for a hybrid AD environment and beyond -- creating a path to IGA.
Active Directory is easily the most widely used directory, with statistics stating that over 90% of organizations using it for access management. For this reason, it’s a given that attackers are after Active Directory. It touches nearly everything and once it is controlled by an attacker then they can take, destroy, or ransom anything. Active Directory breaches are usually accomplished by breaking in then elevating privilege to an admin level. The phrase “get the DA” (Domain Admin) is common in the attacker community. Active Roles is specially designed to remove the need to wide-spread permissions in Active Directory and Safeguard is designed to store privileged credentials. When they work together, layers of security are multiplied. Join Dan Conrad as he demonstrates Active Roles Just-In-Time Provisioning with Safeguard which allows privileges to be assigned only at the time of a credential check-out and removed at check-in.
In this advanced session, seasoned Active Roles users will cover some advanced concepts of Active Roles requests, workflows, and policies -- and how and when to use them. Learn more about different requests that the Web UI issues when making a request (Get, GetPolicyInformation, CheckPropertyValues, Create). Gain an understanding of how a request is processed with the security check, pre-processing, op execution and post-processing stages.
One Identity solutions provide exceptional benefits to organizations, when multiple solutions are deployed in conjunction the added security and efficiency realized is greatly increased. This session provides an overview demonstration of Active Roles, Password Manager, Defender, Starling Approval Anywhere and Safeguard all driven from the initial onboarding via Active Roles.
Privileged Security for your hybrid AD environment is within reach. Learn how to leverage the integration of Active Roles with Safeguard to secure admin accounts.
Learn how you can use the new features in Active Roles for managing Azure AD and Office 365 including managing Azure only, guest and contact accounts. We will also cover Azure based workflows, policies and access templates.
Learn how to use the new SCIM connector in Active Roles for both inbound and outbound requests.
Service Now is more and more used as the end-user portal for requests, but remains a complex tool to manage the AD/AAD /O365 environment provisioning. We will show you how Active Roles is helping and the different integrations that we can propose to save time and money.
Learn how One Identity Active Roles facilitates the management of the unique and complex requirements of higher-education user communities.
Together Active Roles, Safeguard and Change Auditor help protect against internal and external AD-based security threats. Plus, it delivers visibility and control over privileged access while enhancing Active Directory administrative efficiency and error mitigation. In the event of security incidents, this powerful combined One Identity + Quest solution can tell you what happened, fix it and prevent it from happening again.
View this tech demo of a Pass the Hash attack, in which One Identity's Dan Conrad shows how enterprises can reduce the risk from compromised privileged credentials with Active Directory.