group access identity

The Role of Roles in Delegating Access

The delegation of directory administration to those outside of IT is a concept whose time has come. But it can’t be done hap-hazardly; IT needs to define what is being delegated and to whom. We’re at a point in the evolution of our industry that two truths have come to fruition: IT no longer has…

When One Plus One is Greater than Two: Active Directory Automation

Max Wertheimer, the founder of the Gestalt Theory, once stated in a borrowed and commonly referenced Aristotle philosophy that “the whole is greater than the sum of its parts”. This means that when one thing is grouped with multiple properties, it becomes stronger and can provide more value than it could alone. This concept directly…

map

Defining Active Directory Management Tools

I see the term Active Directory management tools used everywhere from provisioning to SSO to reporting to auditing.  I see it used for managing users, groups, GPOs, and everything in between.  It seems to be a broad term meaning software that fills in the holes that Microsoft left in Active Directory. It also seems that “tools”…

project database

Active Directory VPN via Security Groups

A Virtual Private Network or VPN, is a technology that helps you establish an encrypted environment on your network so that when you access the World Wide Web, your system is safe and secure from prying eyes. In addition to this, VPN also facilitates in hiding your IP address so that you can visit websites…