Pour bénéficier d’une expérience Web optimale, utilisez Internet Explorer 11 ou version ultérieure, Chrome, Firefox, ou Safari.

Why UNITE? | One Identity

One Identity UNITE conference provides technical training, business tracks, direct access to product development, valuable networking opportunities and ability to provide input on future product enhancements. Watch this video and see why

Related videos

Successfully manage the definition of a business application
Successfully manage the definition of a business application

Watch this video to learn how One Identity Manager’s Application Governance provides a method for application owners to prove governance.

One Identity Manager Video Series, Video No. 10: Use cases – Customization
One Identity Manager Video Series, Video No. 10: Use cases – Customization

Use Cases - Customization - Configure Synchronization Editor - Customization capabilities overview

One Identity Manager Video Series, Video No. 9: Use cases - Configuration
One Identity Manager Video Series, Video No. 9: Use cases - Configuration

Use Cases – Configuration - Business Configuration Data - Configure Approval Workflows - Web Portal Configuration

One Identity Manager Video Series, Video No. 8: Use cases - Reports and Auditing
One Identity Manager Video Series, Video No. 8: Use cases - Reports and Auditing

Use Cases - Reports and Auditing - Use Available Reports - Report Subscription - Show Entitlement Origin

One Identity Manager Video Series, Video No. 7: Use cases – Access certification and rules
One Identity Manager Video Series, Video No. 7: Use cases – Access certification and rules

Use Cases - Resource Lifecycle - Access Certification - Create a Campaign - Create and Manage a Segregation of Duties Rule

One Identity Manager Video Series, Video No. 6: Use cases – Request and approval
One Identity Manager Video Series, Video No. 6: Use cases – Request and approval

Use Cases - Request and approval - Make a Role Requestable - Request a Business Role - Approve a Requestable - Request with Mandatory Expiry Date o Configure Mandatory Request Properties o Request with a Mandatory "Valid Until" Date

One Identity Manager Video Series, Video No. 5: Use cases – Roles
One Identity Manager Video Series, Video No. 5: Use cases – Roles

Use Cases - Resource Lifecycle - Create a Role - Assign a Business Resources - Configure a Dynamic Role

One Identity Manager Video Series, Video No. 4: Use cases – Deactivation and Password Changes
One Identity Manager Video Series, Video No. 4: Use cases – Deactivation and Password Changes

Use Cases - Identity and Account Lifecycle - Disable an Identity - Enable an Identity - Password management

One Identity Manager Video Series, Video No. 3: Use cases - Identities and Accounts
One Identity Manager Video Series, Video No. 3: Use cases - Identities and Accounts

Use cases - Identity and Account Lifecycle - Create Identities and Accounts - Business Data Modification

One Identity Manager Video Series, Video No. 2: One Identity Manager Overview - Key Features
One Identity Manager Video Series, Video No. 2: One Identity Manager Overview - Key Features

- Comprehensive IGA - Target System Support - Docker Support - Analyst Wording

One Identity Manager Video Series, Video No. 1: One Identity Manager Overview
One Identity Manager Video Series, Video No. 1: One Identity Manager Overview

- Target System Centric vs. Identity Governance - Active Directory Management vs. Identity and Access Governance

"Security starts with identity, because identity... is at the center of everything."
"Security starts with identity, because identity... is at the center of everything."

Learn how Ulta Beauty safely runs SAP in their enterprise with Identity Manager, which allows the retailer to control its modules by the mantra, "configure, not code". "Security starts with identity, because identity... is at the center of everything." - Paul Lucido, Manager of IAM

2019 Partner of the Year Highlights the Value of One Identity Bootcamps
2019 Partner of the Year Highlights the Value of One Identity Bootcamps

Learn how systems integrator, IPG, leverages One Identity Bootcamps to gain hands-on experience, valuable insights and direct access to subject-matter experts.

One Identity Manager SAP Experience #16 SAP GRC mapping in Identity Manager
One Identity Manager SAP Experience #16 SAP GRC mapping in Identity Manager

Implementation details:

  • SAP GRC mapping in Identity Manager

One Identity Manager SAP Experience #15 Implementation Details
One Identity Manager SAP Experience #15 Implementation Details

  • SAP related Configuration Parameter
  • IT Shop Implications
  • SAP related One Identity Manager Modules

Produits apparentés

One Identity Safeguard for Privileged Passwords
One Identity Safeguard for Privileged Passwords

Secure, control and automate the process of granting privileged access

Version d’essai en test

One Identity Safeguard for Privileged Sessions
One Identity Safeguard for Privileged Sessions

Grant privileged access for a specific period or session with full recording and replay

Version d’essai en test

One Identity Safeguard for Privileged Analytics
One Identity Safeguard for Privileged Analytics

Detect risk in your privileged users to prevent damage to your organization

Version d’essai en test

One Identity Hybrid Subscription
One Identity Hybrid Subscription

Expand the functionality of One Identity on-premises products

Privilege Manager for Windows
Privilege Manager for Windows

Privilege Manager for Windows : contrôlez et sécurisez le compte administrateur sur les systèmes Windows

Active Roles
Active Roles

Active Roles est un outil d’administration AD unifié qui sécurise les environnements hybrides et plus encore.

Version d’essai en test

Privilege Manager for Unix
Privilege Manager for Unix

L’outil Privilege Manager™ for Unix, un composant de la solution Privileged Access Suite for Unix

Identity Manager
Identity Manager

Rationalisez la gestion des identités, la sécurité et les accès basés sur des privilèges

Privileged Password Manager
Privileged Password Manager

Avec Privileged Password Manager, vous pouvez automatiser et contrôler le processus d’attribution d’accès aux comptes et mots de passe à privilèges.

Privileged Session Manager
Privileged Session Manager

Avec Privileged Session Manager, vous pouvez attribuer un accès aux comptes à privilèges tout en répondant aux exigences d’audit et de conformité.

Privilege Manager for Sudo
Privilege Manager for Sudo

Renforcez Sudo 1.8.X avec un serveur de stratégies central, une gestion sudo centralisée et des rapports

Identity Manager – Data Governance Edition
Identity Manager – Data Governance Edition

Avec l’outil Identity Manager - Data Governance Edition, c’est le chef d’entreprise qui contrôle les accès, et non son équipe informatique.

Privileged Access Suite for Unix
Privileged Access Suite for Unix

Résolvez facilement les difficultés liées à la sécurité et à l’administration inhérentes aux systèmes Unix et garantissez la conformité à l’aide de la solution Privileged Access Suite for Unix.

Version d’essai en test

Password Manager
Password Manager

Offrez aux utilisateurs la possibilité de réinitialiser les mots de passe oubliés en toute sécurité

Version d’essai en test