Webinar Series: AD Consolidation through Virtualization, Part 1: Authentication, SSO
How RadiantOne Virtualization Gives You the Benefits of AD Consolidation—Without Disrupting Your Existing Identity Infrastructure
Whether your goal is streamlining authentication processes after a merger, providing a unified view of users for existing on-premises applications and cloud applications, or boosting the security of your system, RadiantOne uses the power of virtualization to achieve full integration and rationalization of identity data from across multiple AD domains and forests—without a system overhaul.
Many medium to large enterprises and organizations have an identity infrastructure that contains multiple AD domains and forests. This fragmentation is a technical challenge for multiple applications and use cases that require a more unified view of workforce identity for security, authentication, and authorization. And this requirement can be compounded in the case of mergers and acquisitions and seasonal fluctuations in staffing that require adding new populations or reorganizing existing ones, not to mention the new imperative to support cloud applications and directories. So the “target” of a consolidation has been on the agenda for multiple IAM teams.
Unfortunately implementing a “physical AD consolidation” requires an extensive effort to restructure all your current domains and forests and reorganize them into a unified, brand new set of AD domains hosted by a common forest. This process can be costly, time-consuming, and require extensive customization. Combine that with the increasing use of the cloud for both applications and for data storage and the need for a unified approach for access and identity becomes even greater.
So, how can you get the benefits of AD consolidation, without going through the challenges?
Join us on January 25 for Part 1 of a new webinar series as we discuss the challenges associated with physical AD consolidation and how they can be solved with a logical consolidation leveraging virtualization and federated identity.
In this part, we will see how the solution addresses the problem and simplifies authentication/SSO for multiple classes of applications, including legacy LDAP, traditional Web Access Management, and Federation IdP. Then in Part 2, which will air on Thursday, February 8, we will be discussing the special requirements (reverse engineering, group memberships “remapping,” group migration, etc) for groups management and authorization in the new consolidated AD environments.
When: Thursday, January 25, 2018.