Para tener la mejor experiencia web, use IE11+, Chrome, Firefox o Safari.

Why UNITE? | One Identity

One Identity UNITE conference provides technical training, business tracks, direct access to product development, valuable networking opportunities and ability to provide input on future product enhancements. Watch this video and see why

Related videos

Successfully manage the definition of a business application
Successfully manage the definition of a business application

Watch this video to learn how One Identity Manager’s Application Governance provides a method for application owners to prove governance.

One Identity Manager Video Series, Video No. 10: Use cases – Customization
One Identity Manager Video Series, Video No. 10: Use cases – Customization

Use Cases - Customization - Configure Synchronization Editor - Customization capabilities overview

One Identity Manager Video Series, Video No. 9: Use cases - Configuration
One Identity Manager Video Series, Video No. 9: Use cases - Configuration

Use Cases – Configuration - Business Configuration Data - Configure Approval Workflows - Web Portal Configuration

One Identity Manager Video Series, Video No. 8: Use cases - Reports and Auditing
One Identity Manager Video Series, Video No. 8: Use cases - Reports and Auditing

Use Cases - Reports and Auditing - Use Available Reports - Report Subscription - Show Entitlement Origin

One Identity Manager Video Series, Video No. 7: Use cases – Access certification and rules
One Identity Manager Video Series, Video No. 7: Use cases – Access certification and rules

Use Cases - Resource Lifecycle - Access Certification - Create a Campaign - Create and Manage a Segregation of Duties Rule

One Identity Manager Video Series, Video No. 6: Use cases – Request and approval
One Identity Manager Video Series, Video No. 6: Use cases – Request and approval

Use Cases - Request and approval - Make a Role Requestable - Request a Business Role - Approve a Requestable - Request with Mandatory Expiry Date o Configure Mandatory Request Properties o Request with a Mandatory "Valid Until" Date

One Identity Manager Video Series, Video No. 5: Use cases – Roles
One Identity Manager Video Series, Video No. 5: Use cases – Roles

Use Cases - Resource Lifecycle - Create a Role - Assign a Business Resources - Configure a Dynamic Role

One Identity Manager Video Series, Video No. 4: Use cases – Deactivation and Password Changes
One Identity Manager Video Series, Video No. 4: Use cases – Deactivation and Password Changes

Use Cases - Identity and Account Lifecycle - Disable an Identity - Enable an Identity - Password management

One Identity Manager Video Series, Video No. 3: Use cases - Identities and Accounts
One Identity Manager Video Series, Video No. 3: Use cases - Identities and Accounts

Use cases - Identity and Account Lifecycle - Create Identities and Accounts - Business Data Modification

One Identity Manager Video Series, Video No. 2: One Identity Manager Overview - Key Features
One Identity Manager Video Series, Video No. 2: One Identity Manager Overview - Key Features

- Comprehensive IGA - Target System Support - Docker Support - Analyst Wording

One Identity Manager Video Series, Video No. 1: One Identity Manager Overview
One Identity Manager Video Series, Video No. 1: One Identity Manager Overview

- Target System Centric vs. Identity Governance - Active Directory Management vs. Identity and Access Governance

"Security starts with identity, because identity... is at the center of everything."
"Security starts with identity, because identity... is at the center of everything."

Learn how Ulta Beauty safely runs SAP in their enterprise with Identity Manager, which allows the retailer to control its modules by the mantra, "configure, not code". "Security starts with identity, because identity... is at the center of everything." - Paul Lucido, Manager of IAM

2019 Partner of the Year Highlights the Value of One Identity Bootcamps
2019 Partner of the Year Highlights the Value of One Identity Bootcamps

Learn how systems integrator, IPG, leverages One Identity Bootcamps to gain hands-on experience, valuable insights and direct access to subject-matter experts.

One Identity Manager SAP Experience #16 SAP GRC mapping in Identity Manager
One Identity Manager SAP Experience #16 SAP GRC mapping in Identity Manager

Implementation details:

  • SAP GRC mapping in Identity Manager

One Identity Manager SAP Experience #15 Implementation Details
One Identity Manager SAP Experience #15 Implementation Details

  • SAP related Configuration Parameter
  • IT Shop Implications
  • SAP related One Identity Manager Modules

productos relacionados

One Identity Safeguard for Privileged Passwords
One Identity Safeguard for Privileged Passwords

Secure, control and automate the process of granting privileged access

Descargar prueba gratis

One Identity Safeguard for Privileged Sessions
One Identity Safeguard for Privileged Sessions

Grant privileged access for a specific period or session with full recording and replay

Descargar prueba gratis

One Identity Safeguard for Privileged Analytics
One Identity Safeguard for Privileged Analytics

Detect risk in your privileged users to prevent damage to your organization

Descargar prueba gratis

One Identity Hybrid Subscription
One Identity Hybrid Subscription

Expand the functionality of One Identity on-premises products

Privilege Manager for Windows
Privilege Manager for Windows

Privilege Manager for Windows le permite controlar y asegurar la cuenta de administrador en los sistemas Windows

Active Roles
Active Roles

Active Roles es una herramienta de administración de AD unificada que asegura entornos híbridos y mucho más.

Descargar prueba gratis

Privilege Manager for Unix
Privilege Manager for Unix

Privilege Manager™ para Unix, un poderoso miembro de Privileged Access Suite for Unix

Descargar prueba gratis

Identity Manager
Identity Manager

Optimice la administración de identidad de usuarios, el acceso de privilegios y la seguridad

Privileged Password Manager
Privileged Password Manager

Con Privileged Password Manager, usted puede automatizar y controlar el proceso de otorgar acceso a las contraseñas y las cuentas con privilegios.

Privileged Session Manager
Privileged Session Manager

Con Privileged Session Manager usted puede proporcionar acceso a las cuentas con privilegios, a la vez que reúne los requisitos de auditoría y cumplimiento.

Privilege Manager for Sudo
Privilege Manager for Sudo

Mejore Sudo 1.8.X con un servidor de políticas central, administración de sudo centralizada y generación de informes.

Descargar prueba gratis

Identity Manager – Data Governance Edition
Identity Manager – Data Governance Edition

Identity Manager: Data Governance Edition protege a su empresa al proporcionarle el control de acceso al dueño y no al personal del área de TI.

Privileged Access Suite for Unix
Privileged Access Suite for Unix

Supere con facilidad los desafíos de administración y seguridad inherentes a los sistemas basados en UNIX, y logre el cumplimiento mediante Privileged Access Suite for Unix.

Descargar prueba gratis

Password Manager
Password Manager

Password Manager proporciona una solución simple, segura y de autoservicio que permite que los usuarios finales restablezcan las contraseñas olvidadas y desbloqueen sus cuentas.

Descargar prueba gratis