{"id":38031,"date":"2021-07-09T10:30:44","date_gmt":"2021-07-09T09:30:44","guid":{"rendered":"https:\/\/www.firstware.com\/?page_id=38031"},"modified":"2024-06-12T09:52:05","modified_gmt":"2024-06-12T08:52:05","slug":"access-management","status":"publish","type":"page","link":"https:\/\/www.firstware.com\/en\/authorization\/access-management\/","title":{"rendered":"Access Management"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row fullwidth=&#8221;yes&#8221; fw_columns=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1513944624958{margin-top: -50px !important;padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1506587559620{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;10561&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]\n<h1>Access Management<\/h1>\n<h2 style=\"margin-top: 0;\">Determine who can do what<\/h2>\n<p>Secure authorization management in Active Directory and in the cloud:<\/p>\n<p>Manage hybrid IT landscapes with dynamic group management in IDM-Portal.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;linkedBox&#8221;][vc_column][vc_column_text]\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1717404134624{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1717404200330{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_icon icon_fontawesome=&#8221;fas fa-user-friends&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;zoomIn&#8221; css=&#8221;&#8221; custom_color=&#8221;#002d73&#8243; link=&#8221;url:%23groupmanagement&#8221;][vc_column_text css=&#8221;&#8221;]\n<p><a class=\"menuicon\" href=\"#groupmanagement\">Group management<\/a><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-random&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;zoomIn&#8221; css=&#8221;&#8221; custom_color=&#8221;#002d73&#8243; link=&#8221;url:%23delegation&#8221;][vc_column_text css=&#8221;&#8221;]\n<p><a class=\"menuicon\" href=\"#delegation\">Role-based delegation<\/a><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-check-circle&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;zoomIn&#8221; css=&#8221;&#8221; custom_color=&#8221;#002d73&#8243; link=&#8221;url:%23approvals&#8221;][vc_column_text css=&#8221;&#8221;]\n<p><a class=\"menuicon\" href=\"#approvals\">Approvals<\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; background_color=&#8221;rgba(97,139,212,0.1)&#8221;][vc_column][vc_column_text]\n<h2>The user perspective<\/h2>\n<p>Employees expect that everything is running smoothly at work.<\/p>\n<p>&nbsp;<\/p>\n<p class=\"absatz\"><img decoding=\"async\" class=\"alignnone wp-image-10333 size-full\" title=\"Access Mangement with IDM-Portal\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2018\/02\/Anwendersicht_Berechtigungen.png\" alt=\"Access Mangement with IDM-Portal\" width=\"300\" height=\"241\" \/><\/p>\n<p class=\"absatz2\">Authorization management ensures that they have access to relevant<\/p>\n<p class=\"absatz2\"><i class=\"fa fa-user FA-midblue\"><!--icon--><\/i>drives<\/p>\n<p class=\"absatz2\"><i class=\"fa fa-user FA-midblue\"><!--icon--><\/i> data<\/p>\n<p class=\"absatz2\"><i class=\"fa fa-user FA-midblue\"><!--icon--><\/i> distribution lists<\/p>\n<p class=\"absatz\">without waiting times and error messages.<\/p>\n<p><strong>What happens technically behind the scenes doesn&#8217;t interest them:<\/strong><\/p>\n<p><a href=\"https:\/\/firstware.com\/en\/user-driven-identity-management\/\">User friendly Identity &amp; Access Management<\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; background_color=&#8221;#ffffff&#8221;][vc_column][vc_column_text]\n<h2>The solution<\/h2>\n<h3>Create groups and assign memberships<\/h3>\n<p class=\"absatz\">Authorization management in IDM-Portal is easy and well-organized.<br \/>\nGroups and group members are added or removed via <strong>&#8216;drag &amp; drop&#8217; <\/strong>.<\/p>\n<p class=\"absatz\">It is simple and straightforward so that non-IT department heads or HR staff can do the job.<\/p>\n<p class=\"absatz\"><img decoding=\"async\" class=\"imgshadow alignnone wp-image-10812 size-large\" title=\"Group memberships of a user - Authorization management with IDM-Portal\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2018\/05\/Group-memberships-1024x542.png\" alt=\"Group memberships of a user - Authorization management with IDM-Portal\" width=\"1024\" height=\"542\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2018\/05\/Group-memberships-1024x542.png 1024w, https:\/\/www.firstware.com\/wp-content\/uploads\/2018\/05\/Group-memberships-300x159.png 300w, https:\/\/www.firstware.com\/wp-content\/uploads\/2018\/05\/Group-memberships-768x406.png 768w, https:\/\/www.firstware.com\/wp-content\/uploads\/2018\/05\/Group-memberships.png 1257w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p class=\"absatz\">They assign memberships directly within a user&#8217;s profile or use the section &#8216;Groups&#8217; to create new groups and add members.<\/p>\n<p>For the administrator, this means a<strong> massive reduction in workload<\/strong>,<br \/>\nfor the end user <strong>best working conditions<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/firstware.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"ButtonBeratung2 aligncenter\">Consult me now<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; background_color=&#8221;#eff5ff&#8221;][vc_column][vc_column_text]\n<h2>Practical applications &#8211; Three examples<\/h2>\n[\/vc_column_text][vc_row_inner equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1506589305218{padding-right: 30px !important;padding-left: 30px !important;}&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-universal-access&#8221; color=&#8221;custom&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221; custom_color=&#8221;#ffa200&#8243;][vc_column_text]\n<h3>Permission groups<\/h3>\n<p>Create authorization groups<br \/>\nin IDM-Portal and assign members.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_icon icon_fontawesome=&#8221;far fa-envelope&#8221; color=&#8221;custom&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221; custom_color=&#8221;#ffa200&#8243;][vc_column_text]\n<h3>Email distribution lists<\/h3>\n<p>Create email distribution lists<br \/>\nfor sending email messages.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1506436502576{padding-right: 5px !important;}&#8221;][vc_icon icon_fontawesome=&#8221;fas fa-share-square&#8221; color=&#8221;custom&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221; custom_color=&#8221;#ffa200&#8243;][vc_column_text]\n<h3>Department groups<\/h3>\n<p>Specify department groups and<br \/>\nadd relevant employees.<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; background_color=&#8221;#ffffff&#8221; css=&#8221;.vc_custom_1627035436464{margin-top: -20px !important;}&#8221;][vc_column][vc_column_text]\n<h2>Active Directory and Cloud &#8211; Connect both worlds<\/h2>\n<p class=\"absatz\">Are you one of those companies that are opening up towards the cloud?<br \/>\nThen you are probably wondering how access management works in AD and in Entra ID.<br \/>\nThe quick answer: <strong>IDM-Portal handles both tasks.<\/strong><\/p>\n<p class=\"paragraph\">What happens when you make changes in Active Directory through IDM-Portal?<\/p>\n<p><strong>IDM-Portal works with your Active Directory<\/strong>. As a result, all changes are made directly to the AD.<br \/>\nThis applies to group memberships as well as all other properties (department, phone number and other data).<br \/>\nIn a hybrid environment, we turn on a <strong>powerful synchronization of the data with Entra ID<\/strong>.<br \/>\nThis way, both directories are at the same up-to-date status.<\/p>\n[\/vc_column_text][vc_column_text]\n<p><a href=\"https:\/\/firstware.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"ButtonBeratung aligncenter\">Find a hybrid IAM solution<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; fw_columns=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1627461636561{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1506587559620{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;10586&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; fw_columns=&#8221;yes&#8221; top_margin=&#8221;-50&#8243; bottom_margin=&#8221;-40&#8243; css=&#8221;.vc_custom_1628147652929{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1506587559620{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_column_text]\n<h2>Main features &#8211; Access management<\/h2>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; background_color=&#8221;#ffffff&#8221; el_id=&#8221;groupmanagement&#8221;][vc_column][vc_row_inner equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1506589305218{padding-right: 30px !important;padding-left: 30px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]\n<h3 style=\"text-align: left;\"><strong>Edit group memberships directly in the user profile<\/strong><\/h3>\n<p class=\"absatz2\" style=\"text-align: left;\">Permissions can be set up <strong>directly in the user&#8217;s profile<\/strong>.<\/p>\n<p class=\"absatz2\" style=\"text-align: left;\">Conveniently view all Active Directory groups or search for the relevant groups.<\/p>\n<p class=\"absatz2\" style=\"text-align: left;\">Simply select the required groups.<\/p>\n<p class=\"absatz2\" style=\"text-align: left;\">By using &#8216;drag &amp; drop&#8217; the groups can be easily moved over to the user&#8217;s profile.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1513950243574{padding-top: 40px !important;}&#8221;][vc_column_text css_animation=&#8221;zoomIn&#8221;]\n<p><img decoding=\"async\" class=\"imgshadow alignnone wp-image-38527 \" title=\"Access management - Group memberships of a user - IDM-Portal\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Edit-group-membership-within-user-profile.png\" alt=\"\" width=\"413\" height=\"318\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Edit-group-membership-within-user-profile.png 622w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Edit-group-membership-within-user-profile-300x231.png 300w\" sizes=\"(max-width: 413px) 100vw, 413px\" \/><\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:40px;\"><\/div><\/div>[vc_column_text css_animation=&#8221;zoomIn&#8221;]\n<p><img decoding=\"async\" class=\"imgshadow alignnone wp-image-38529 \" title=\"Access management - Members of a group - IDM-Portal\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Access-management-from-a-group-perspective-2.png\" alt=\"\" width=\"446\" height=\"310\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Access-management-from-a-group-perspective-2.png 551w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Access-management-from-a-group-perspective-2-300x209.png 300w\" sizes=\"(max-width: 446px) 100vw, 446px\" \/><\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]\n<h3 style=\"text-align: left;\"><strong>Access management from a group perspective<\/strong><\/h3>\n<p class=\"absatz\" style=\"text-align: left;\">Get all your Active Directory and Entra ID group and permissions management done in IDM-Portal.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\">In the menu tab &#8216;Groups&#8217; you manage <strong>groups and group members<\/strong>. Alternatively, you delegate the editing to the owner of the group.<\/p>\n<p style=\"text-align: left;\">Select those employees who you want to add as members of the group. You can also remove users by using the \u2018drag and drop\u2019 function.<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text]\n<p><a href=\"https:\/\/firstware.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"ButtonBeratung aligncenter\">Find out what is possible<\/button><\/a><\/p>\n[\/vc_column_text][vc_row_inner equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1627464908533{padding-right: 30px !important;padding-left: 30px !important;}&#8221; el_id=&#8221;delegation&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]\n<h3 style=\"text-align: left;\"><strong>Access rights assigned by helpdesk and manager<\/strong><\/h3>\n<p class=\"absatz\" style=\"text-align: left;\">Usually, head of departments or help desk team members are not able to grant permissions for their own resources. <a href=\"https:\/\/firstware.com\/en\/identity-management\/delegation\/\">Use IDM-Portal to delegate<\/a> the access rights management to the owner.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\"><strong>The following tasks can be delegated, depending on the role of the user:<\/strong><\/p>\n<ul class=\"aligncenter\" style=\"text-align: left;\">\n<li class=\"listcenter\">Create new mail or permission groups<\/li>\n<li class=\"listcenter\">Add or delete new members<\/li>\n<li class=\"listcenter\">Trigger <a href=\"https:\/\/firstware.com\/en\/authorization\/approval-workflow\/\">workflows<\/a> that lead to approvals<\/li>\n<\/ul>\n<p style=\"text-align: left;\">Windows does not offer a user-friendly front end tool for normal users to manage department groups. With IDM-Portal, <a href=\"https:\/\/firstware.com\/en\/identity-management\/user-management\/\">group and user management<\/a> tasks do not need to be exclusively in the hands of IT admins anymore.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1513950243574{padding-top: 40px !important;}&#8221;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:60px;\"><\/div><\/div>[vc_column_text css_animation=&#8221;zoomIn&#8221;]\n<p><img decoding=\"async\" class=\"alignnone wp-image-38154 size-full\" title=\"Access management - Groups, delegation, roles - IDM-Portal\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Delegation-of-tasks-450x299-1.png\" alt=\"Access management - Groups, delegation, roles - IDM-Portal\" width=\"450\" height=\"299\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Delegation-of-tasks-450x299-1.png 450w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Delegation-of-tasks-450x299-1-300x199.png 300w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1629287083534{margin-top: -30px !important;padding-right: 30px !important;padding-left: 30px !important;}&#8221; el_id=&#8221;approvals&#8221;][vc_column_inner width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:60px;\"><\/div><\/div>[vc_column_text css_animation=&#8221;zoomIn&#8221;]\n<p><img decoding=\"async\" class=\"alignnone wp-image-38219 size-full\" title=\"Access management - Approval workflow with IDM-Portal\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/Access-management-Approval-workflow-450x322-1.png\" alt=\"Access management - Approval workflow with IDM-Portal\" width=\"450\" height=\"322\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Access-management-Approval-workflow-450x322-1.png 450w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/Access-management-Approval-workflow-450x322-1-300x215.png 300w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1560955224675{padding-top: 10px !important;}&#8221;][vc_column_text]\n<h3 style=\"text-align: left;\"><strong>Integration of approval workflows<\/strong><\/h3>\n<p class=\"absatz\" style=\"text-align: left;\">Configure which groups and data changes require approval in IDM-Portal. Define which persons must agree to the application process.<\/p>\n<p class=\"absatz\" style=\"text-align: left;\">The <a href=\"https:\/\/firstware.com\/en\/authorization\/approval-workflow\/\">approval-based workflow<\/a> includes clearly defined steps:<\/p>\n<ul class=\"aligncenter\" style=\"text-align: left;\">\n<li class=\"listcenter\">Applicants save changes in the IDM portal<\/li>\n<li class=\"listcenter\">Approvers are <strong>automatically informed<\/strong><\/li>\n<li class=\"listcenter\">Decision is made via approval web interface<\/li>\n<\/ul>\n<p style=\"text-align: left;\"><strong>Key decision makers drive the process.<\/strong><\/p>\n<p style=\"text-align: left;\"><strong>Key users are involved and fully informed.<\/strong><\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; background_color=&#8221;#eff5ff&#8221; css=&#8221;.vc_custom_1627469716402{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;6\/12&#8243;][vc_single_image image=&#8221;36705&#8243; img_size=&#8221;454&#215;378.23&#8243; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1628145727476{margin-top: 25px !important;}&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_column_text css=&#8221;.vc_custom_1629358423495{margin-top: -25px !important;}&#8221; el_class=&#8221;p2&#8243;]<!-- Abschnitt 5 --><\/p>\n<h2>Secure Access Management<\/h2>\n<p><strong>As optimized as you want.<\/strong><\/p>\n<p class=\"absatz\"><strong>As smart as you need.<\/strong><\/p>\n<ul class=\"featureList aligncenter\">\n<li class=\"tick\">Automated permissions<\/li>\n<li class=\"tick\">Easy group editing via &#8216;drag &amp; drop&#8217;<\/li>\n<li class=\"tick\">User view and group view<\/li>\n<li class=\"tick\">Delegation with role-based scope<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<p><a href=\"https:\/\/firstware.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"ButtonBeratung2 aligncenter\">Inquire now<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; bottom_margin=&#8221;0&#8243; background_color=&#8221;#3d4045&#8243; el_class=&#8221;whitetext&#8221;][vc_column el_class=&#8221;whitetext&#8221;][vc_column_text]\n<h2 class=\"whitetext\">The advantages<\/h2>\n[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243; offset=&#8221;vc_col-md-offset-1\/5 vc_col-md-1\/5&#8243;]<div class=\"fa-icon-wrapper aligncenter\"><i class=\"fas fa fa-check-square-o fa-icons-firstware\" aria-hidden=\"true\"><\/i><\/div>[vc_column_text el_class=&#8221;whitetext&#8221;]\n<h3 class=\"whitetext\">Simple assignment of permissions<\/h3>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; offset=&#8221;vc_col-md-1\/5&#8243;]<div class=\"fa-icon-wrapper aligncenter\"><i class=\"fas fa fa-child fa-icons-firstware\" aria-hidden=\"true\"><\/i><\/div>[vc_column_text el_class=&#8221;whitetext&#8221;]\n<h3 class=\"whitetext\">All access rights from day 1<\/h3>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; offset=&#8221;vc_col-md-1\/5&#8243;]<div class=\"fa-icon-wrapper aligncenter\"><i class=\"fas fa fa-refresh fa-icons-firstware\" aria-hidden=\"true\"><\/i><\/div>[vc_column_text el_class=&#8221;whitetext&#8221;]\n<h3 class=\"whitetext\">Automated authorizations<\/h3>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243; offset=&#8221;vc_col-md-offset-1\/5 vc_col-md-1\/5&#8243;][vc_column_text]\n<p><img decoding=\"async\" class=\"size-full wp-image-10056 aligncenter no-margin-top\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2017\/10\/kaffee-orange.png\" alt=\"Kaffee-Entlastung\" width=\"90\" height=\"90\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2017\/10\/kaffee-orange.png 200w, https:\/\/www.firstware.com\/wp-content\/uploads\/2017\/10\/kaffee-orange-150x150.png 150w\" sizes=\"(max-width: 90px) 100vw, 90px\" \/><\/p>\n[\/vc_column_text][vc_column_text el_class=&#8221;whitetext&#8221;]\n<h3 class=\"whitetext\">Noticeable relief<br \/>\nfor IT<\/h3>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; offset=&#8221;vc_col-md-offset-0 vc_col-md-1\/5&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-10126\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2017\/12\/trafficlight-2.png\" alt=\"Rollen Ampel\" width=\"90\" height=\"90\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2017\/12\/trafficlight-2.png 200w, https:\/\/www.firstware.com\/wp-content\/uploads\/2017\/12\/trafficlight-2-150x150.png 150w\" sizes=\"(max-width: 90px) 100vw, 90px\" \/>[\/vc_column_text][vc_column_text]\n<h3 class=\"whitetext\">Role-based delegation<\/h3>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; offset=&#8221;vc_col-md-1\/5&#8243;]<div class=\"fa-icon-wrapper aligncenter\"><i class=\"fas fa fa-clock-o fa-icons-firstware\" aria-hidden=\"true\"><\/i><\/div>[vc_column_text css=&#8221;.vc_custom_1518690029193{margin-top: -10px !important;}&#8221; el_class=&#8221;whitetext&#8221;]\n<h3 class=\"whitetext\">Time and cost savings<\/h3>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; background_color=&#8221;#ffffff&#8221; css=&#8221;.vc_custom_1627465472790{margin-top: -20px !important;}&#8221;][vc_column][vc_column_text]\n<h2>Automate with concept &#8211; without manual group administration<\/h2>\n<p>If your main goal is to save time and assign permissions effectively and fast you should solve access management tasks conceptionally.<\/p>\n<p class=\"absatz\">What are the criteria for the permissions?<\/p>\n<p><strong>IDM-Portal speaks PowerShell<\/strong>\u00a0and offers multilayered possibilities for <a href=\"https:\/\/firstware.com\/authorization\/automation\/\">automation<\/a>.<\/p>\n<p>At best you <strong>will not need AD group management<\/strong> anymore.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/firstware.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"ButtonBeratung2 aligncenter\">Explain more<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; background_color=&#8221;rgba(97,139,212,0.1)&#8221; css=&#8221;.vc_custom_1627465655533{padding-top: 20px !important;border-radius: 20px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:40px;\"><\/div><\/div>[vc_column_text]\n<p><img decoding=\"async\" class=\"aligncenter wp-image-36712 size-medium\" title=\"IAM expert\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/IT-Expert-1-300x300.png\" alt=\"IAM expert\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/IT-Expert-1-300x300.png 300w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/IT-Expert-1-150x150.png 150w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/IT-Expert-1.png 484w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text el_class=&#8221;p&#8221;]\n<h2>Tip from the expert<\/h2>\n<p style=\"text-align: center;\">The best way to implement an authorization concept is to approach the subject from two sides.<br \/>\nWe are happy to explain why. Standard cases can already be easily handled<br \/>\nvia IDM-Portal&#8217;s <a href=\"https:\/\/firstware.com\/en\/identity-management\/user-management\/\">user management<\/a>.<\/p>\n<p style=\"text-align: center;\">Also, actively involve your resource owners by letting them manage the groups themselves<br \/>\nor <a href=\"https:\/\/firstware.com\/en\/authorization\/approval-workflow\/\">trigger approval workflows<\/a>.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;-60&#8243; background_color=&#8221;#ffffff&#8221;][vc_column][vc_column_text]\n<h2>Contact<\/h2>\n<p class=\"absatz\">You reach us at<\/p>\n<p class=\"absatz\" style=\"color: #003a93; font-size: 1.2em; font-style: 800;\"><a href=\"tel:+4981969984330\">+49 81 969 984 330<\/a><\/p>\n<p class=\"absatz\">or via our<\/p>\n[\/vc_column_text][vc_column_text]\n<p><a href=\"https:\/\/firstware.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"ButtonBeratung aligncenter\">Contact form<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row fullwidth=&#8221;yes&#8221; fw_columns=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1513944624958{margin-top: -50px !important;padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1506587559620{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;10561&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"parent":37142,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-38031","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Access Management - FirstWare IDM-Portal - Clear access rights<\/title>\n<meta name=\"description\" content=\"Access management in AD &amp; M365 | Access rights | Department &amp; permission groups | Email distribution lists | Role-based delegation | Automated processes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firstware.com\/en\/authorization\/access-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Access Management - FirstWare IDM-Portal - Clear access rights\" \/>\n<meta property=\"og:description\" content=\"Access management in AD &amp; M365 | Access rights | Department &amp; permission groups | Email distribution lists | Role-based delegation | Automated processes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firstware.com\/en\/authorization\/access-management\/\" \/>\n<meta property=\"og:site_name\" content=\"FirstWare IDM-Portal\" \/>\n<meta property=\"og:image\" content=\"https:\/\/firstware.com\/wp-content\/uploads\/2018\/02\/Anwendersicht_Berechtigungen.png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/access-management\\\/\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/access-management\\\/\",\"name\":\"Access Management - FirstWare IDM-Portal - Clear access rights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/access-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/access-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/Anwendersicht_Berechtigungen.png\",\"description\":\"Access management in AD & M365 | Access rights | Department & permission groups | Email distribution lists | Role-based delegation | Automated processes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/access-management\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/access-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/access-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/Anwendersicht_Berechtigungen.png\",\"contentUrl\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/Anwendersicht_Berechtigungen.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/access-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Authorization\",\"item\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/authorization\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Access Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\",\"name\":\"FirstWare IDM-Portal\",\"description\":\"Identity and Autorization Management in M365 and Active Directory\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#organization\",\"name\":\"FirstWare IDM-Portal\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/IDM-Portal.ico\",\"contentUrl\":\"https:\\\/\\\/www.firstware.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/IDM-Portal.ico\",\"width\":1,\"height\":1,\"caption\":\"FirstWare IDM-Portal\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Access Management - FirstWare IDM-Portal - Clear access rights","description":"Access management in AD & M365 | Access rights | Department & permission groups | Email distribution lists | Role-based delegation | Automated processes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firstware.com\/en\/authorization\/access-management\/","og_locale":"en_US","og_type":"article","og_title":"Access Management - FirstWare IDM-Portal - Clear access rights","og_description":"Access management in AD & M365 | Access rights | Department & permission groups | Email distribution lists | Role-based delegation | Automated processes.","og_url":"https:\/\/www.firstware.com\/en\/authorization\/access-management\/","og_site_name":"FirstWare IDM-Portal","og_image":[{"url":"https:\/\/firstware.com\/wp-content\/uploads\/2018\/02\/Anwendersicht_Berechtigungen.png","type":"","width":"","height":""}],"twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.firstware.com\/en\/authorization\/access-management\/","url":"https:\/\/www.firstware.com\/en\/authorization\/access-management\/","name":"Access Management - FirstWare IDM-Portal - Clear access rights","isPartOf":{"@id":"https:\/\/www.firstware.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firstware.com\/en\/authorization\/access-management\/#primaryimage"},"image":{"@id":"https:\/\/www.firstware.com\/en\/authorization\/access-management\/#primaryimage"},"thumbnailUrl":"https:\/\/firstware.com\/wp-content\/uploads\/2018\/02\/Anwendersicht_Berechtigungen.png","description":"Access management in AD & M365 | Access rights | Department & permission groups | Email distribution lists | Role-based delegation | Automated processes.","breadcrumb":{"@id":"https:\/\/www.firstware.com\/en\/authorization\/access-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firstware.com\/en\/authorization\/access-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstware.com\/en\/authorization\/access-management\/#primaryimage","url":"https:\/\/firstware.com\/wp-content\/uploads\/2018\/02\/Anwendersicht_Berechtigungen.png","contentUrl":"https:\/\/firstware.com\/wp-content\/uploads\/2018\/02\/Anwendersicht_Berechtigungen.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firstware.com\/en\/authorization\/access-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.firstware.com\/en\/"},{"@type":"ListItem","position":2,"name":"Authorization","item":"https:\/\/www.firstware.com\/en\/authorization\/"},{"@type":"ListItem","position":3,"name":"Access Management"}]},{"@type":"WebSite","@id":"https:\/\/www.firstware.com\/en\/#website","url":"https:\/\/www.firstware.com\/en\/","name":"FirstWare IDM-Portal","description":"Identity and Autorization Management in M365 and Active Directory","publisher":{"@id":"https:\/\/www.firstware.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firstware.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firstware.com\/en\/#organization","name":"FirstWare IDM-Portal","url":"https:\/\/www.firstware.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstware.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/IDM-Portal.ico","contentUrl":"https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/IDM-Portal.ico","width":1,"height":1,"caption":"FirstWare IDM-Portal"},"image":{"@id":"https:\/\/www.firstware.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/pages\/38031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/comments?post=38031"}],"version-history":[{"count":0,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/pages\/38031\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/pages\/37142"}],"wp:attachment":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/media?parent=38031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}