LDAP Query

Intelligently Organize Domain Computer Objects in Security Groups

Just as Active Directory has a user object for each network user, it has a computer object for each computer in the domain. These objects are treated as an account. As with user accounts, computer accounts provide a means for authenticating and auditing the computer’s access to the network and its access to domain resources.…

project database

Active Directory Group Membership Based on External Data Sources

In role based access control, security groups and distribution lists will by design, have specific associations to resources based on the need to apply a certain job function, task, or action to specific classifications of workers. The membership of security groups and/or distribution lists are adeptly managed using object attributes stored in Active Directory with…

bored

How 500 plus Companies Save Dollars Using Active Directory Groups

Imanami has been saving companies money for 12 years by providing purpose-built solutions for Active Directory Group Management that automate the manual processes of managing Exchange distribution lists and security groups. On average, our customers achieve Return on Investment in a few months after purchasing and installing our automation products. The savings are seen in…

bored

CIOs and IT Shape Imanami Active Directory Group Management SW

Imanami Active Directory Management Software is based on feedback from CIOs and IT Managers every step of the way. We get the feedback about market needs because we ask. We host online forms and chat rooms to discuss issues with our customers and would-be customers. Imanami’s CEO and Chief Software Architect, Robert Haaverson, makes no…

bored

A Day In The Life Of IT Without Imanami AD Group Management Solutions

Active Directory Group Management solutions can make all the difference in the day-to-day life of an IT Manager and everyone else in the company. As we all know, there are two ways to manage any department. The first management style is “Putting out Fires” the second is “Proactively Managing” by anticipating problems based on past performance,…

bored

Automate Membership Of a Shadow Group

Active Directory does an excellent job of allowing administrators to arrange their security identities in a hierarchal fashion. In a previous blog post , we discussed nested security groups which can be used to implement inherited security permissions. Active Directory also allows you to structure your Active Directory Organizational Units (OU for short) to reflect…

bored

Active Directory Password Reset…….Back to the Future…!!!

Many organizations still follow the traditional practice of writing or printing passwords on paper and keeping them in a physical vault, which would remain under the control of the IT department. When you have issues with your password or you need to unlock your account, you will have to either track the person who may…

bored

Avoiding Token Bloat with Dynamically Managed Nested Groups

In reading the article “Token Bloat Troubleshooting by Analyzing Group Nesting in AD” by M. Ali, it is pointed out that membership in the nesting of groups can in many cases lead to a condition where tokens carried by an identity can cause performance issues. Along with performance issues are cracks in your security when…

bored

Active Directory creates a Secure Work Enviroment!

Many of our clients are professional services organizations; law firms, marketing agencies, consultants and the like. One of the things that they have in common is that they often have a need to create a place where people both in and outside of their organization can come to share resources for a period of time. …

map

Active Directory user provisioning (cost of underprivileged users)

Active Directory provisioning is a vague abstract term.  Is a user provisioned once they have an AD account?  Once they have an Exchange mailbox?  Once they are in a few security groups?  Or once they can do their job? I posit that it is once they can do their job.  And that’s where the rub…