Imanami Lock

Extending Organizational Security and Productivity through SSO with SAML

No one really likes to remember passwords.  You’re probably in one of two camps – either you use the same password everywhere just to avoid needing to remember a variety of complex phrases, or you, like me, use a password database to store them (in which case, I only need to remember the password to…

Active Directory Multi-Factor Authentication

Securely Extending IT with Multi-Factor Authentication

In previous blogs, we’ve stressed the need for IT to go outside of itself and embrace application owners, line-of-business owners, and other stakeholders within your user base. These people generally have better insight into the daily needs and changes related to the applications and resources that they use and can therefore manage the access to…

Defining Roles in Active Directory

Defining Roles when Delegating Access

When Active Directory first came out, we were all happy just to have a few levels of administrative granularity. There were the domain admins, a few admins over servers, local admin privileges across all the workstations, and — if you were really cutting edge — perhaps some kind of custom delegation to a specific service…

Real Cost of Managing Active Directory Groups

How to Calculate Cost of Managing Active Directory Groups

Groups are the lifeblood of companies and organizations of every size with in their on-premise and hybrid environments. They are the foundation for security and accessibility to resources and email functionality. The challenge is keeping them updated and current after they are created. In many cases, IT is tasked (via tickets) to add and subtract…

Let Go

Letting Go: When Users Should Be in Control

I love those ridiculous commercials for the new selling service LetGo. People are holding onto an item that they just can’t seem to part with, despite the peril it may be putting them in. Like the one where the guy has the heavy bowling ball in one hand, and the other is grasping the bumper…

IT - Build or Buy

Automating Group Management: Build or Buy?

I know what you’re thinking: “They’re just going to say buy.” Admittedly, given that we make the best group management solution in the industry, we are a little biased. However, we also recognize that using a third-party solution to simplify the management of Active Directory groups doesn’t necessarily fit every environment. So, the answer isn’t…

Group Management Delegation

Less Work, More Secure

I remember standing in front of a group of IT pros, talking about how to handle daunting tasks, and I jokingly asked, “By a show of hands, does anyone want to work for a living? Anyone?” I think we all know that working in IT can sometimes involve working with some very cool technologies, but…

Active Directory Scripts

The Dangers of Scripting Active Directory Group Management

Now more than ever, scripting in the Microsoft world has extended the administrative abilities of an IT pro well beyond the simple use of built-in tools. You have, in essence, an unlimited ability to automate just about any part of the administration of your Microsoft environment — including Active Directory — with Powershell and other…

Group Access Card

Groups: Active Directory’s Access Card

RFID access cards are commonplace in many companies. These cards provide access to different sections of the office, often limiting access to the appropriate people, so that not everyone has access to all locations within the building. For example, not everyone has access to the server room. And sometimes, because of this, many of us…

Dynamic Group Management

Managing Group Memberships Dynamically

Because organizations like yours depend on distribution lists and security groups to do their jobs every day, inaccuracies in these lists or groups can have a significant adverse impact. For example, a single employee who’s missing from a distribution group could cause that person to miss the registration deadlines  for health insurance. Or a security…