For the best web experience, please use IE11+, Chrome, Firefox, or Safari
Resources
- All Resources
- Learning Hub
- Blog
- Communities
- United States (English)
- Brazil (Português)
- France (Français)
- Germany (Deutsch)
- Japan (日本語)
- Mexico (Español)
- AccountSettings
Free TrialsRequest Pricing
- Video Gallery
- What is Active Roles? | One Identity
03:13
Extend and enhance native capabilities of Active Directory and Azure Active Directory with One Identity Active Roles. Learn More
Show Transcript Hide Transcript
Your identity landscape holds the keys to all of Active Directory, Azure Active Directory, and Active Directory-connected devices and applications. And that ecosystem is the target of most cyber attacks today. One step in the door by a malicious actor could result in a costly, damaging breach that could devastate your business. With One Identity Active Roles, you can secure, protect, and manage your AD, Azure AD, and Microsoft 365 environments across all your domains and tenants from a single interface. From a security perspective, think of Active Roles as privileged access management for AD and Azure AD. It allows you to truly delegate a least privileged access model where highly granular permissions can be applied to objects, not just by organizational unit, but based on any criteria you can imagine, ensuring that your users only have the exact access they need and nothing more. You can control the process of creating, managing, de-provisioning, and restoring objects by enforcing policies to require that your environment adheres to your data standards, audit controls, and business needs. This includes requiring certain properties, automatically generating properties, controlling properties based on rules, restricting properties to a list of options, and much more. Additionally, dynamic group memberships can adjust in real time as objects are created or modified, providing role-based access controls built according to your requirements. And when it's time to get rid of an object, a de-provisioning policy can streamline that process, controlling everything that happens behind the scenes, as well as providing an option to reverse that process in case a mistake was made. And all these changes are being tracked so you can go at any point in time and view the audit history. But why process things manually? You can fully automate time-intensive tasks, taking care of those long-awaited cleanup efforts that never got prioritized and freeing up your admins to focus on more important projects. Even better, these workflows can be automatically triggered by a certain action and can run steps before and after that action occurs, like requiring a group owner to approve any membership changes to their group or moving an object to a new OU when its department changes. In the case of life cycle management, you can fully automate the entire process by synchronizing with a data source like your HR system. In summary, One Identity Active Roles provides a Swiss army knife of tools to not only architect your directory infrastructure to be resilient to cyber threats, but to easily keep it that way. Contact One Identity today to schedule a live demonstration and to discover more about how Active Roles can help secure and protect your business.
Related videos
Book your ticket for UNITE Prague to guarantee you don’t end up on this year’s waitlist. Start looking forward to the best collaboration in the world of identity security, March 2025, in the stunning city of Prague!
Duration: 00:51
Join Ted Harrington, Executive Partner at Independent Security Evaluators and a leader of ethical hackers, at One Identity UNITE San Diego 2024. Ted’s keynote session, Hacking the Future, will explore how to think like a hacker to strengthen your organization’s security. Don’t miss your chance to meet Ted and learn this invaluable information from him at UNITE, September 23-27, 2024.
Duration: 00:32
See how Leroy Merlin, a home improvement and gardening retailer, improved its operational efficiency and security by automating manual processes with Active Roles.
Duration: 01:43
See Ted Harrington speak at UNITE 2024 San Diego!
Duration: 00:23
Your admins hold the keys to your IT kingdom. Their access can keep your organization running smoothly or – if compromised – can bring it to a devastating stop. Attend to ensure your PAM strategy is ready.
Duration: 00:29
Your identity security strategy isn’t foolproof until all your users (whether they’re on-prem, in the cloud or both) are properly managed. Attend to move your governance practices into the modern IT era.
Duration: 00:29
Identity security is at the forefront of protecting your organization. Join us to learn from industry experts and enhance your technical and business knowledge with hours of free technical training.
Duration: 00:29
Technology is great, but a smoothly run organization can take that technology and do great things with it. Attend One Identity UNITE to experience our business-focused learning track and to learn how to harness tech trends.
Duration: 00:29
See how we are integrating OneLogin access management solutions into the market’s only unified identity offering. Attend to accelerate and secure employee and customer access with our dedicated Access Management learning track.
Duration: 00:29
Omni San Diego Hotel offers a fun venue in which to learn how to enhance your identity security knowledge. Plus, our conference party will take place aboard the historic USS Midway! Register today to learn, innovate and collaborate with an amazing backdrop.
Duration: 00:29
See you at UNITE in San Diego 2024!
Duration: 03:45
One Identity UNITE is coming to San Diego in 2024! Our Madrid conference sold out in record time, so don’t wait – register now for One Identity UNITE.
Duration: 00:42
AD management can be tough for colleges/universities with sensitive data to protect and compliance regulations to meet. See why Barry University trusts Active Roles to monitor user/group identity lifecycles.
Duration: 04:03
Hear what One Identity partner, Narayan Sharma of Tata Consultancy Services (TCS) has to say about Zero Trust, changes in the IT security landscape and three priorities that should be on every CISO’s to-do list.
Duration: 14:56
Related products
Active Roles
Secure and automate the administration, access and provisioning of users and groups for AD/AzureAD
Share