Learn the top six high impact uses of Active Roles that delight and benefit both users and AD admins to provide dramatic increases in efficiency and security. In this session, we'll cover: User and Group Management; Automation; Admin delegation; Expanded Scope; Workflows; and Reporting.
Learn how Active Roles can manage cloud-based systems using the “easy button” of Starling Connect and/or the SCIM standard. This session will cover provisioning to cloud-based applications and from SCIM compliant applications with Starling Connect.
For organizations moving to the cloud, the security and account lifecycle management of their environments is critical but challenging. In this session, we'll cover how Active Roles positions you for cloud-readiness, share options for deploying on prem vs. in the cloud, and cover Azure and AWS uses. Learn how Active Roles delivers the support and power needed for a hybrid AD environment and beyond -- creating a path to IGA.
Active Directory is easily the most widely used directory, with statistics stating that over 90% of organizations using it for access management. For this reason, it’s a given that attackers are after Active Directory. It touches nearly everything and once it is controlled by an attacker then they can take, destroy, or ransom anything. Active Directory breaches are usually accomplished by breaking in then elevating privilege to an admin level. The phrase “get the DA” (Domain Admin) is common in the attacker community. Active Roles is specially designed to remove the need to wide-spread permissions in Active Directory and Safeguard is designed to store privileged credentials. When they work together, layers of security are multiplied. Join Dan Conrad as he demonstrates Active Roles Just-In-Time Provisioning with Safeguard which allows privileges to be assigned only at the time of a credential check-out and removed at check-in.
In this advanced session, seasoned Active Roles users will cover some advanced concepts of Active Roles requests, workflows, and policies -- and how and when to use them. Learn more about different requests that the Web UI issues when making a request (Get, GetPolicyInformation, CheckPropertyValues, Create). Gain an understanding of how a request is processed with the security check, pre-processing, op execution and post-processing stages.
Watch to gain insights into enhancing security around privileged users in your hybrid Active Directory environment by deploying a Zero Trust and Least Privilege operating model.
One Identity solutions provide exceptional benefits to organizations, when multiple solutions are deployed in conjunction the added security and efficiency realized is greatly increased. This session provides an overview demonstration of Active Roles, Password Manager, Defender, Starling Approval Anywhere and Safeguard all driven from the initial onboarding via Active Roles.
Learn how to manage Active Roles with the REST API with a hands on demo and see specific examples from Service Now. Additionally, we will show how to leverage the Swagger interface for instruction.
Privileged Security for your hybrid AD environment is within reach. Learn how to leverage the integration of Active Roles with Safeguard to secure admin accounts.
Learn how you can use the new features in Active Roles for managing Azure AD and Office 365 including managing Azure only, guest and contact accounts. We will also cover Azure based workflows, policies and access templates.
Learn how to use the new SCIM connector in Active Roles for both inbound and outbound requests.
Learn how One Identity Active Roles facilitates the management of the unique and complex requirements of higher-education user communities.
Together Active Roles, Safeguard and Change Auditor help protect against internal and external AD-based security threats. Plus, it delivers visibility and control over privileged access while enhancing Active Directory administrative efficiency and error mitigation. In the event of security incidents, this powerful combined One Identity + Quest solution can tell you what happened, fix it and prevent it from happening again.
View this tech demo of a Pass the Hash attack, in which One Identity's Dan Conrad shows how enterprises can reduce the risk from compromised privileged credentials with Active Directory.