• Identity Management
    • User Management
    • Delegation
    • Self Service
    • Out of Office Assistant
    • Password Reset
    • Phone book
  • Authorization
    • Access Management
    • Approval Workflow
    • Role-based access
    • Single sign-on (SSO)
    • Automation
  • Systems
    • Active Directory
    • Entra ID – M365
    • HR systems
    • PowerShell
  • Solutions
    • Why IDM-Portal
    • Compliance
    • Editions & prices
    • Further solutions
  • References
    • Our customers
    • Our projects
    • Partnership
    • Press
  • Company
    • About us
    • News
  • Contact
  • English
FirstWare IDM-PortalFirstWare IDM-Portal
FirstWare IDM-PortalFirstWare IDM-Portal
User Driven
Identity Management
  • Identity Management
    • User Management
    • Delegation
    • Self Service
    • Out of Office Assistant
    • Password Reset
    • Phone book
  • Authorization
    • Access Management
    • Approval Workflow
    • Role-based access
    • Single sign-on (SSO)
    • Automation
  • Systems
    • Active Directory
    • Entra ID – M365
    • HR systems
    • PowerShell
  • Solutions
    • Why IDM-Portal
    • Compliance
    • Editions & prices
    • Further solutions
  • References
    • Our customers
    • Our projects
    • Partnership
    • Press
  • Company
    • About us
    • News
  • Contact
  • English

AD and authorization audit: Control, compliance and clarity with IDM-Portal

Active Directory (AD) is the central hub of many IT infrastructures. It is where user accounts, groups, and access rights...

Passkeys: The Future of Authentication

A passkey is an authentication method based on the FIDO2 standard specification. Unlike traditional passwords, a passkey securely stores cryptographic...

Check password rules

How can we check password rules? Do they meet the complexity requirements? This article explains various methods for checking compliance...

What is IT governance?

IT governance is a strategic issue for all companies that use IT, whether it is in the cloud, in a...

When recertification of authorizations makes sense

Recertifications are intended to ensure that everyone only has access to what they need to do their work. It is...

Attribute-Based Access Control (ABAC) – Access rights based on attributes

Attribute-Based Access Control (ABAC) is playing an increasingly important role in assigning user rights in on-premises Active Directory environments, but...

Log4Shell – FirstWare IDM-Portal not affected

The NCSC is highlighting a critical vulnerability in Apache Log4j. The major vulnerability, named Log4Shell, was discovered on December 10, 2021 in the Java...

Contact Info

  • FirstAttribute AG
  • Am Büchele 18, 86928 Hofstetten, Germany
  • +49 8196 998 4330
  • firstattribute.com

Topics

  • Terms of Use & EULA
  • Legal Information
  • Privacy Policy
  • Contact

Latest News

  • AD and authorization audit: Control, compliance and clarity with IDM-Portal
  • Management of authorization groups by department heads
  • Manage M365 groups: This makes it especially easy
  • Migration to Microsoft Graph API: Optimizing MFA management and security with PowerShell SDK
  • Passkeys: The Future of Authentication
  • Our IAM guide to preparing for an identity and access management project

© 2025 · FirstAttribute AG.