What is HR driven provisioning?
HR driven provisioning is the automated creation of digital identities (for example AD user accounts) based on a human resources (HR) system. Read more…
What is MIM?
Microsoft Identity Manager (MIM) is an on-premises server-based synchronization engine that synchronizes users’ digital identity data between systems. Read more…
What is Azure AD Connect?
Azure AD Connect is a synchronization service intended to run between AD (Active Directory) and Azure AD – though it can do much more! Read more…
What is Zero Trust?
Zero Trust is not a product, it’s a principle – never trust, always verify. Read more about how it works. Read more…
What is MFA?
MFA stands for multi-factor authentication. Let’s start with authentication. It is about proving who you are. In face-to-face situations you might present photo ID to prove who you are – a “relying authority” wants to see a passport or driving licence (for example) that is produced by some trustworthy “authentication provider” (like a government). When… Read more…
What is Azure AD Application Proxy?
Azure AD Application Proxy is an Azure AD Premium cloud service which allows you to easily publish your on-premises (web) applications to users who work outside the corporate network. Read more…
What is SSGM?
Self-service group management allows specific staff in an organization to manage groups themselves. Find out how self-service groups work in Azure AD Read more…
What is the difference between MIM and Azure AD Connect?
Azure AD Connect is based on MIM and looks a lot like MIM – and it would be easy to fall into the trap of thinking that they are the same. But they are not. Discover how they differ… Read more…
What is Azure AD Connect cloud provisioning?
Azure AD Connect cloud provisioning is an agent-based identity sync tool that is configured and managed from the cloud. While it performs the same basic functions as Azure AD Connect Sync, the architectures are radically different. Read more…
What is pass-through authentication?
Pass-through authentication (PTA) is a feature of Azure AD Connect – an agent running on one or several on-premises domain-joined servers, validates a user’s sign-on on behalf of Azure AD directly with the on-premises AD. Read more…
What is password writeback?
Password writeback in Azure AD Connect ensures that when a password changes in Azure AD it is written back to the local AD. Read more…
What is Azure AD hybrid join?
Azure AD hybrid join is a feature of Azure AD Connect , and one of several device registration approaches supported by Azure AD. Discover more about what it does. Read more…
What is seamless single sign-on?
Seamless Single Sign-on is a feature of Azure AD Connect which can be used in conjunction with password hash synchronization or pass-through authentication. Read more…
What is password hash synchronization (PHS)?
Password Hash Synchronization is the default authentication option in Azure AD Connect – whenever a password is changed on premises, the password hash from Active Directory is synchronized into Azure AD. Read more…
What is FIDO2?
What is FIDO2? Identity expert John Craddock explains how FIDO2 aims to eliminate passwords and strengthen security. Read more…
What is ECMA2?
What is ECMA2? Extensible Connectivity Management Agents enable an identity system to connect to identity stores in other systems. How does it work? Read more…
What is Decentralized Identity?
How would it be if YOU were in sole control of your identity & not relying on multiple organizations protecting it for you? That’s Decentralized Identity. Read more…
What is Blockchain?
Blockchain is a Decentralized Ledger Technology (DLT) which allows a definitive ledger of transactions to be created without the need for a central authority to arbitrate which transactions are valid. Read more…
What does that stand for? Identity acronyms explained
What does that stand for? There are so many acronyms in identity management! Check out our definitive list of commonly used acronyms in IDM. Read more…
What is Privileged Identity Management?
Privileged Identity Management (PIM) is a capability within identity management focused on the special requirements of managing highly privileged access. Read more…
What is Enterprise Mobility?
Enterprise mobility is the ability for workers to connect and do business using the internet, without regard to time or proximity of co-workers and customers. Read more…
What is the Security Transformation?
Security transformation is a profound shift in cybersecurity. It’s different way of thinking about IT security largely due to the cloud. Read more…
What is SaaS?
SaaS stands for ‘Software as a Service’ is when a software company provides their software on a hosted platform and the customer buys only what they need. Read more…
What is Office 365?
Office 365 is a suite of Microsoft software and services subscriptions. It offers a range of familiar services to subscribers through the Microsoft cloud. Read more…
What is Azure AD?
Azure AD (Active Directory) is Microsoft’s multi-tenant, cloud-based Identity as a Service (IDaaS) solution. Read more…
What is identity protection?
Identity protection describes activities that safeguard digital identities (and information linked to those identities) from unauthorized use. Read more…
What is hybrid cloud?
Hybrid cloud is a computing environment which combines on-premises, private cloud, and public cloud services. Read more…
What is machine learning?
Machine learning is the study and construction of algorithms that can learn from and make predictions on data. Read more…
What is Identity-Driven Security?
We can no longer rely on a physical perimeter for security, but we can put controls around identity information. Read more…
What is the Internet of Things (IoT)?
The Internet of Things is connectivity of devices to the internet. Almost anything with an on/off switch can be connected. The possibilties are huge! Read more…
What is Privileged Access Management?
Privileged access management is a way of controlling access to accounts with raised security rights or privileges such as administrator IDs, systems admins. Read more…
What is Authentication?
IT authentication asks ‘who are you?’ before granting access. The usual ID/password model can be supplemented with various other methods for extra security. Read more…
What is Conditional Access?
Conditional access is a set of policies and configurations that control which devices have access to various services and data sources. Read more…
What is GRC?
GRC stands for Governance, Risk Management & Compliance. These 3 disciplines can help an organization meet its objectives. In IT, typically that’s security. Read more…
What is SSO?
SSO stands for Single Sign-On. A user signs in just once, and gets access to all the systems they need. Read more…
MIM, FIM and ILM compared
MIM 2016, the latest incarnation of Microsoft’s on-premises identity management platform, incorporates the best features of its predecessors, FIM 2010 and ILM. But what are the differences in Microsoft’s identity management software? Read more…
What is identity management?
Identity management is the administration of the digital identities of users within a system, for example a company’s network. It underpins security. Read more…