One Identity, a Quest Software business, helps organizations establish an identity-centric security strategy. With a unique identity and access management (IAM) portfolio, our award-winning offering includes identity governance, AD-centered IAM, privileged access management and identity SaaS solutions, One Identity helps organizations secure their enterprise end to end, smoothly make their digital transformation, eliminate identity challenges and reduce their attack surface from internal and external threats. Our unequalled commitment to our customers’ long-term IAM success is evident in our 7,500 customers worldwide that rely on us to manage more than 125 million identities.

Identity Administration

Optimized Administration of Identities, Accounts and Processes

Deliver the proper level of access quickly, securely and with compliance, regardless of whether your user is joining, moving or leaving. With efficient identity administration, you can unify and centralize policies and processes across the enterprise. You can automate provisioning and password management to systems, platforms or applications and drastically cut the amount of time spent on manual processes resetting password for your users with self-service capabilities.>
Provisioning

Provisioning

Automated provisioning of user accounts, identities and access rights for on-prem, hybrid or cloud environments. Overcome traditional security limitations of IAM framework solutions and integrate target systems with ease.

Featured Products


Identity Manager

Streamline user identity management, privilege access and security


Active Roles

Active Roles is a unified AD-management tool that secures hybrid environments and much more.

Process Orchestration
The key to any effective user administration program is automation and effective workflows. When you do that, you can ensure account-provisioning consistency, accuracy and efficiency. One Identity delivers powerful, business-driven automation for the most troublesome administrative processes. Whether those processes are needed to control AD accounts or beyond, One Identity has you covered.

Featured Products


Active Roles

Active Roles is a unified AD-management tool that secures hybrid environments and much more.

Identity Manager

Streamline user identity management, privilege access and security

Password Management

Password Management

Simplify password management and security for your extended hybrid AD environment. With end-user self-service capabilities, you can significantly reduce the time that your IT team spends handling password resets. One Identity solutions can help your organization implement consistent and customizable password policies across a diverse set of platforms and applications. You can unify identities and synchronize passwords, thus eliminating the need for users to remember multiple passwords.

Featured Products

Password Manager

Give users the power to reset forgotten passwords securely

Extend AD-based identity administration to UNIX/Linux

Extend AD-based identity administration to UNIX/Linux

Overcome the native shortcomings UNIX and Linux by making those platforms full citizens in Active Directory. Unify authentication, provisioning, password management and role management across platforms. Plus, you can reduce the day-to-day user-administration burden of overworked UNIX/Linux admins.

Privileged Access Suite for Unix

Easily overcome security and admin challenges inherent in UNIX-based systems

Identity administration for cloud applications

Identity administration for cloud applications

Easily extend user administration capabilities of One Identity solutions to the cloud and significantly reduce the time and effort to onboard cloud applications. With Starling Connect, a SaaS-based solution, you can preserve your IT investment by building on your current IAM solutions to streamline processes and secure your hybrid enterprise.

Featured Products

Starling Connect

Extends identity governance to the cloud and reduce time to onboard new cloud applications

Identity Governance

Complete, business-driven governance for identity, data and privileged permissions

video11:10
Govern identities and access for all users for your on-prem, hybrid and cloud environments. Satisfy audit and compliance initiatives, and easily provide management with a clear view of your governance posture. Satisfy attestation and recertification requirements with ease, and provide auditors all they need without having to go through a burdensome manual reporting effort to collect data about internal, external and privileged accounts that have access to your on-premises, cloud and hybrid applications. With One Identity you can do all this with one solution, and unify security policies across your entire enterprise.

Capabilities

Ensure that access for all users and to all systems is accurate and appropriate – and all identity decisions and actions follow policies and can be reported on.
Identity Lifecycle

Identity Lifecycle

Grant access rights by defined roles, rules and policies. Provide standard on-boarding and off-boarding processes for employees and contractors, and quickly and easily manage access to resources as a user’s responsibilities evolve along with the business.

Featured Products

Identity Manager

Streamline user identity management, privilege access and security

Access Certification

Access Certification

Streamline the identity governance process of managing user identities, privileges and security across the enterprise, including application access, unstructured data and privileged accounts. Achieve all this by placing user management and access control into the hands of authorized business users.

Featured Products

Identity Manager

Streamline user identity management, privilege access and security

Privileged Account Governance

Privileged Account Governance

Extend governance to privileged accounts and administrator access with unified policies, automated and business-driven attestation, enterprise provisioning, and access request and fulfillment. Simplify privileged governance with defined roles and associated policies, access-approval workflows and perform periodic attestation of privileged access.

Featured Products


Identity Manager

Streamline user identity management, privilege access and security

Access Request

Access Request

Enable users to requests access to network resources, physical assets, groups and distribution lists and control access rights and permissions for their entire identity lifecycle while using predefined approval processes and workflows.

Featured Products

Identity Manager

Streamline user identity management, privilege access and security

Auditing

Auditing

Deliver audit-ready reports to meet ongoing compliance requirements. Provide auditors with detailed, real-time governance reports that includes information about what resources are in your environment, who has access to them, when, and why that access was granted and terminated.

Data Governance

Data Governance

Extend the governance advantages of unified policy, automated and business-driven attestation, enterprise provisioning, and access request and fulfillment to privileged accounts and administrator access. Simplify privileged governance with the ability to define roles and associated policies, access approval workflows and perform periodic attestation of privileged access.

Identity Governance for SaaS applications

Identity Governance for SaaS applications

Extend the governance advantages of unified policy, automated and business-driven attestation, enterprise provisioning, and access request and fulfillment to privileged accounts and administrator access to your SaaS applications.

Featured Products

Starling Connect

Extends identity governance to the cloud and reduce time to onboard new cloud applications

Privileged Access Management Solutions

Mitigate security risks by securing, recording, analyzing and governing privileged access

Read the e-book Strategies to Ensure Success for Your Privileged Management

Listen to an Analyst from Forrester discuss lessons learned from high-profile breaches

Most breaches involve compromised privileged credentials and bad actors gaining unlimited access to critical systems and data, which can have a major impact on your organization’s security and compliance. One Identity Privileged Access Management (PAM) solutions mitigate security risks and enable your organization to achieve compliance by securing, controlling, monitoring, analyzing and governing privileged access. Our PAM solutions enable you to provide the full credential when necessary or limit access with granular delegation for least-privileged access. The result is enhanced security and compliance with more efficient administration and governance of privileged access.

Learn how One Identity Privileged Management solutions simplify privileged access and without putting your entire organization at risk.

Capabilities

Privileged Session Management

Privileged Session Management

Control, monitor and record privileged sessions of administrators, remote vendors and other high-risk users. Sessions recordings are indexed to simplify and accelerate searching for events. Automated reports enable you to easily meet your auditing and compliance requirements.

Featured Products


One Identity Safeguard for Privileged Sessions

Grant privileged access for a specific period or session with full recording and replay

Privileged Password Vault

Privileged Password Vault

Automate, control and secure the process of granting privileged credentials with role-based access management and automated workflows. Plus, you can manage passwords from anywhere with nearly any device.

Featured Products


One Identity Safeguard for Privileged Passwords

Secure, control and automate the process of granting privileged access

Privileged Threat Analytics

Privileged Threat Analytics

Analyze privileged session recordings to identify your high-risk privileged users. Monitor questionable behaviors and other anomalies so that you can discover internal and external threats and take immediate actions to prevent breaches.

Featured Products


One Identity Safeguard for Privileged Analytics

Detect risk in your privileged users to prevent damage to your organization

Least Privileged Access

Least Privileged Access

Protect your organization and prevent security breaches by providing just the right amount of access to administrators so that they can perform their duties. Implement a least-privilege security approach with granular delegation of administrative access on UNIX and Windows servers and desktops.

Featured Products


Privileged Access Suite for Unix

Easily overcome security and admin challenges inherent in UNIX-based systems


Active Roles

Active Roles is a unified AD-management tool that secures hybrid environments and much more

UNIX Identity Consolidation

UNIX Identity Consolidation

Remove the stand-alone authentication and authorization requirement of native UNIX in favor of a more secure, single-identity/point-of-management functionality available through Active Directory (AD). Using the One Identity AD bridge solution, you can extend the unified authentication and authorization of Active Directory to UNIX, Linux and Mac systems.

Featured Products


Authentication Services

Extend the compliance and security of Active Directory to your enterprise

Privileged Access Governance

Privileged Access Governance

Integrate Identity Manager with Safeguard to extend its governance capabilities, including unified policies, automated and business-driven attestation, and enterprise provisioning. Users can request, provision and attest to privileged- and general-user access within Identity Manager thus achieving a unified governance approach for all employees, regardless of their role and level of access.

Featured Products


Identity Manager

Streamline user identity management, privilege access and security

Two-Factor Authentication

Two-Factor Authentication

Integrate two-factor authentication with privileged management solutions for an added layer of security for your most powerful users and accounts. One Identity offers both on-premises and SaaS-based 2FA solutions so you can choose the method that best meets your security, operational, and financial goals.

Featured Products


Starling Two-Factor Authentication

Secure your organization and keep your users productive.


Defender

Enhance security with two-factor authentication.

AD Account Lifecycle Management

Increase efficiency, security and compliance

video08:57>Build a strong foundation in Active Directory (AD) to deploy critical identity-management capabilities, such as provisioning, group and role management, password management, and governance. One Identity can help your organization achieve the level of administration and governance to meet your security and compliance needs. If your organization is like most, the vast majority of your identity processes are managed via AD and/or Azure AD accounts, which means you’re well down the path to governance. We can take you the rest of the way.

Capabilities

Achieve identity-process objectives for your hybrid AD environment and then extend them to non-Windows systems and a growing number of critical and popular cloud-based applications.
Hybrid AD Management and Security

Hybrid AD Management and Security

Automate critical identity administration tasks, such as provisioning, de-provisioning, group management, and identity lifecycle management across your entire hybrid AD environment. Control and simplify management by automating the full range of identity lifecycle functions. Streamline account creation and unify cross-platform account management after an AD/Azure AD migration or consolidation.

Featured Products


Active Roles

Active Roles is a unified AD-management tool that secures hybrid environments and much more.

Add governance to your AD-centered identity management

Add governance to your AD-centered identity management

With One Identity solutions, the jump to governance is a small one. Through cloud-delivered identity services, AD-based identity lifecycle management will soon be easily enhanced with access-request and access-certification capabilities to deliver governance as part of your AD-centered identity management program (available mid-2020).

Featured Products


Starling Connect

Extends identity governance to the cloud and reduce time to onboard new cloud applications

Extend AD-based identity management to UNIX/Linux

Extend AD-based identity management to UNIX/Linux

Overcome the shortcomings of native UNIX and Linux tools by making those platforms ‘full citizens’ in Active Directory. Unify authentication, identity-lifecycle management and role management across platforms. This enables you to institute single sign-on, unify provisioning and enjoy cohesive authentication for multiple environments. Plus, it will reduce the day-to-day user-administration burden of overworked UNIX/Linux admins.

Featured Products


Privileged Access Suite for Unix

Easily overcome security and admin challenges inherent in UNIX-based systems

Password Management

Password Management

Simplify password management and security for your extended hybrid AD environment. With end-user self-service capabilities, you can significantly reduce the time that your IT team spends handling password resets. One Identity solutions can help your organization implement consistent and customizable password policies across a diverse set platforms and applications. You can unify identities and synchronize passwords, thus eliminating the need for users to remember multiple passwords.

Featured Products

Password Manager

Give users the power to reset forgotten passwords securely