How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
Access governance related to audits. BAAN, AX, AS400, AD, Exchange, Footprints, several home-grown applications. We had a relatively small AD (about 5,000 users) but our primary challenge was that all of the legacy systems in place, including multiple instances of BAAN that came from different M&A deals, each with their own configurations and entitlements.
We use it to manage all identities within the company. We use it to monitor users when onboarding and offboarding. We also use it for all the related accounts, such as SAP accounts and AD, to give permissions to our employees within these systems. We do all the privileged management as well within One Identity Manager, which mainly consists of monitoring and control of users, especially who's changing what.
We use it to control identity and access management in our company.
Our primary use case is to control access to our open source Unix and the app store games. This is a banking organization, so you don't want to give all of the rights to one person.
We use it to make requests and show the information that the users have, as well as for attestation.
Our primary use case is for integration to a second system, which will use the role-based access management for the identities and user accounts in the One Identity Manager.
We using it internally. We are also offering it to our customers as a managed service.
The primary use case is to handle identities.
We use it for the identity lifecycle.
My primary use case for the solution for the last several years was migrating from version 6 or older to version 7 or 8. Most of the time, we implement new features, optimize existing features, or do project management for the customer.
The primary use case for this solution is implementing them at the customer site, according to the customer's business needs. E.g., certain customers needs an attestation case. The reason for implementing this solution is the need to become somewhat more in control. There is also the ease of use for connecting products to target systems, like an Active Directory or Exchange.
We implement One Identity Manager for our customers.
The primary use case is to allow users to quickly administrate their permissions and data.
We had several tools over time to try to gain control of IAM, but none of them were capable enough for our needs. We simply had too many systems to work with. We wanted one digital identity for each user and a comprehensive view of each user’s entitlements.
We are managing the entire trend for our identity management, from HR hire until offboarding. We use it for managing all the IT accounts in the company, which has hundreds of thousands of identities.
The primary use case is managing business applications.
We are using One Identity Manager to manage user access requests. Then we manage the provision, as well as the provision of those users. We get the identities from SAP and then we provide them whatever access they are requesting.
It manages our Active Directory and SAP user accounts according to HR data and assigns permissions via request or rules.
We use it for meeting compliance requirements.
We use it to facilitate our total identity and access management process, from HR to our target systems are using this product.
We mostly use One Identity Manager for the tasks of onboarding and offboarding business roles, assigning permissions, and ensuring that we have a record in auditing to fill out compliance needs.
We use it for all things related to identity in our organization.
We use it to give the right access to the right resources.
The primary use case for us is to follow the identity lifecycle, starting from feature improvement up to many accounts along with targeted systems.
We use it to manage identities, We have around 12,000 employees who need to be managed, which is a lot of people worldwide. It is sort of stressful to manage proactively unless you have automated systems.
We have this process of provisioning and non-provisioning users, depending on our SAP HR database.
We have chosen the product, especially for its governance for all the processes of the company, onboarding of employees, and lifecycle processes.
We want to bring our on-premise systems under our control, then our cloud solutions under our control.
We manage companies identities and different legal bodies in it from all over Europe.
As consultants, we use it for provisioning, for access management in SAP, for AD access management. In the future, we may use it for many other applications like SafePoint and Office 365.
This was for customers identity management, where there were a huge number of domains and the customer had unnecessarily complicated the system with a lot of parameters and attributes.