Pour bénéficier d’une expérience Web optimale, utilisez Internet Explorer 11 ou version ultérieure, Chrome, Firefox, ou Safari.

Real-world Identity and Access Management for Unix systems

Learn how to unify identity and access management across Unix, Linux, and Mac systems with IAM Solutions from Quest

Related videos

One Identity Manager Video Series, Video No. 10: Use cases – Customization
One Identity Manager Video Series, Video No. 10: Use cases – Customization

Use Cases - Customization - Configure Synchronization Editor - Customization capabilities overview

One Identity Manager Video Series, Video No. 9: Use cases - Configuration
One Identity Manager Video Series, Video No. 9: Use cases - Configuration

Use Cases – Configuration - Business Configuration Data - Configure Approval Workflows - Web Portal Configuration

One Identity Manager Video Series, Video No. 8: Use cases - Reports and Auditing
One Identity Manager Video Series, Video No. 8: Use cases - Reports and Auditing

Use Cases - Reports and Auditing - Use Available Reports - Report Subscription - Show Entitlement Origin

One Identity Manager Video Series, Video No. 7: Use cases – Access certification and rules
One Identity Manager Video Series, Video No. 7: Use cases – Access certification and rules

Use Cases - Resource Lifecycle - Access Certification - Create a Campaign - Create and Manage a Segregation of Duties Rule

One Identity Manager Video Series, Video No. 6: Use cases – Request and approval
One Identity Manager Video Series, Video No. 6: Use cases – Request and approval

Use Cases - Request and approval - Make a Role Requestable - Request a Business Role - Approve a Requestable - Request with Mandatory Expiry Date o Configure Mandatory Request Properties o Request with a Mandatory "Valid Until" Date

One Identity Manager Video Series, Video No. 5: Use cases – Roles
One Identity Manager Video Series, Video No. 5: Use cases – Roles

Use Cases - Resource Lifecycle - Create a Role - Assign a Business Resources - Configure a Dynamic Role

One Identity Manager Video Series, Video No. 4: Use cases – Deactivation and Password Changes
One Identity Manager Video Series, Video No. 4: Use cases – Deactivation and Password Changes

Use Cases - Identity and Account Lifecycle - Disable an Identity - Enable an Identity - Password management

One Identity Manager Video Series, Video No. 3: Use cases - Identities and Accounts
One Identity Manager Video Series, Video No. 3: Use cases - Identities and Accounts

Use cases - Identity and Account Lifecycle - Create Identities and Accounts - Business Data Modification

One Identity Manager Video Series, Video No. 2: One Identity Manager Overview - Key Features
One Identity Manager Video Series, Video No. 2: One Identity Manager Overview - Key Features

- Comprehensive IGA - Target System Support - Docker Support - Analyst Wording

One Identity Manager Video Series, Video No. 1: One Identity Manager Overview
One Identity Manager Video Series, Video No. 1: One Identity Manager Overview

- Target System Centric vs. Identity Governance - Active Directory Management vs. Identity and Access Governance

"Security starts with identity, because identity... is at the center of everything."
"Security starts with identity, because identity... is at the center of everything."

Learn how Ulta Beauty safely runs SAP in their enterprise with Identity Manager, which allows the retailer to control its modules by the mantra, "configure, not code". "Security starts with identity, because identity... is at the center of everything." - Paul Lucido, Manager of IAM

2019 Partner of the Year Highlights the Value of One Identity Bootcamps
2019 Partner of the Year Highlights the Value of One Identity Bootcamps

Learn how systems integrator, IPG, leverages One Identity Bootcamps to gain hands-on experience, valuable insights and direct access to subject-matter experts.

One Identity Manager SAP Experience #16 SAP GRC mapping in Identity Manager
One Identity Manager SAP Experience #16 SAP GRC mapping in Identity Manager

Implementation details:

  • SAP GRC mapping in Identity Manager

One Identity Manager SAP Experience #15 Implementation Details
One Identity Manager SAP Experience #15 Implementation Details

  • SAP related Configuration Parameter
  • IT Shop Implications
  • SAP related One Identity Manager Modules

One Identity Manager SAP Experience #14 SAP Synchronization Engine #3
One Identity Manager SAP Experience #14 SAP Synchronization Engine #3

SAP Connections: SAP Synchronization Engine

  • Schema Extension (XML)
  • Pros and Cons about a connection customization
  • Synchronization Template for SAP HANA db (ADO.NET Connector)

Produits apparentés

Identity Manager
Identity Manager

Rationalisez la gestion des identités, la sécurité et les accès basés sur des privilèges

Identity Manager – Data Governance Edition
Identity Manager – Data Governance Edition

Avec l’outil Identity Manager - Data Governance Edition, c’est le chef d’entreprise qui contrôle les accès, et non son équipe informatique.