Saturday, January 25, 2020

      Self-Service Password Reset and Unlock Account

According to a recent report, about 1 in 4 calls thereto Help Desks involve resetting expired passwords, and unlocking user accounts. CionSystems saves you time and money by allowing employees to self-manage their accounts without having to call the assistance Desk. This leads to less downtime and increased satisfaction with IT processes.

CionSystems Enterprise Self Service may be a state-of-the-art solution for identity administration and access control. The Enterprise Self Service delivers the functionalities of web access policy creation and enforcement, user self-registration and self-service, delegated administration, password management, and reporting. Having 3 access levels provides the pliability and reach necessary in today’s complex business environment.

Enterprise Self Service also exposes an internet service api for Multifactor Authentication. This web service api is exposed to external clients to authenticate the users with Enterprise Self-service application. The external client just must provide User Name, password as first factor of Authentication and therefore the Second factor to authenticate are going to be to validate using 1.Security Question with Answers 2.OTP over Email 3.OTP over Mobile.



Enterprise Self Service allows users to reset their password and unlock their account using their phone, tablet, shared workstation or kiosk.
Active directory auditor

Active Directory changes daily, yet most IT organizations are unaware of the changes until something breaks. This results in downtime, loss of productivity, and better cost. Becoming proactive and more aware is a component of the general IT optimization strategy. The Active Directory Auditor(Change Notifier) is a useful resource when IT organizations are developing a proactive approach to managing their infrastructure.

This application proactively tracks and reports on any changes that occur within your domains. Simply install this product, configure it, and you’ll get notified in real time of any modifications to your Directory Services. You’ll know directly the thing , type, date/time, details of what changed, and most significantly , who made the changes. All changes are recorded and stored during a log file. This file are often archived and can assist you navigate the safety and compliance audits.



Companies take tons of precautions against unauthorized access to the AD infrastructure. However, preventive and protective measures aren't always enough to seek out the explanation for a break-in if it does occur. For that purpose, infrastructure and security configuration should be constantly audited, enabling you to research problems and minimize the consequences of adverse changes.

In IT, change is normal. However, these changes shouldn't go unwatched. the results of adverse or malicious changes are often very expensive for any business to correct. Real time notifications are key- they're going to save many hours of troubleshooting and therefore the expense of getting your business processes disrupted.

In any company, changes vary by consequences and disruptions they cause. The deletion of a legitimate group in use may be a more serious issue than the modification of that group's description. Even more serious is that the addition of unauthorized user accounts to the Domain Admins group. The reaction time for such changes must be as short as possible.

Active Directory Change Notifier
Unmanaged changes are a drag in every company. they're the first explanation for outages. If they're not prevented, the corporate will fail a security audit. However, even planned changes should be monitored to make sure that policies are being followed.

Active directory backup and restore Tool

Quickly and Accurately Backup and Recover Your Active Directory

Active Directory (AD) is one among the foremost critical systems in your Windows infrastructure. It manages essential information and every one enterprise level applications and security depend upon its health therefore its availability and security must be assured. Human error, malicious actions, and technology failures can easily corrupt your directory, system configurations or Group Policy data. To sustain efficient business operations, you want to securely copy your AD and be able to recover the knowledge 24/7 because any unplanned system downtime means lost productivity.

Active directory backup and restore quickly and accurately
CionSystems' Active Directory Recovery empowers you to get over inadvertent deletions or changes to your AD data in seconds, not hours. With its remote, online, granular restore capability, you'll recover entire sections of the directory, selected objects and individual attributes.
Multi Factor Authentication (MFA)

When it involves MFA, we typically ask three sorts of authentication factors:

Things you know (knowledge), like a password or PIN
Things you have (possession), like a badge or smartphone
Things you are (inheritance), indicated through biometrics, like fingerprints or voice recognition
The latest MFA solutions incorporate additional factors by considering context and behavior when authenticating. for instance :

Where you're when trying to get access, like a restaurant or home
When you try to access, like late in the dark or during the workday
What device you’re using, like a smartphone versus a laptop
What quite network are you accessing, like private or public
Often called Adaptive Authentication, this sort of MFA takes context under consideration to flag logins that are out of the standard . When an individual tries to authenticate in an unusual context, Adaptive MFA may tighten security by requesting additional credentials. For example, if a user is logging in from a restaurant late at night—and this is often not typical for that user—the MFA tool may require the user to enter a code texted to the user’s phone.
Office 365 | Azure Management Simplified

CionSystems’ office365/azure enterprise self-service and cloud identity management simplifies and accelerates on boarding, migration, compliance reporting and management for cloud and hybrid environments.

CionSystems’ cloud based Identity and Access Management (IAM) Solution, CIMT, may be a centralized on premise enterprise to Microsoft OFFICE 365 cloud identity integration, access, data migration and archiving for one drive and management solution. It automates user de-provisioning, provisioning, collects auditing data for compliances from AD| Openldap to Office365. Additionally, the enterprise self-service option for group management, profile management, phonebook , password resets, account unlock for both premise and OFFICE 365 cloud. Keep the passwords in sync between on premise domain to OFFICE 365 cloud and other targets. It also provides choice to reset passwords from windows login.

Azure active directory services


Cloud Identity Management Tool (Azure) and CionSystems´ cloud based Identity and Access Management (IAM) Solution, CMT, may be a centralized on premise enterprise to Microsoft | Office 365 | Azure AD cloud identity integration, Azure Active Directory Services, access and management solution. It automates user de-provisioning, provisioning, collects auditing data for compliances. It enables migration to the Microsoft cloud piecemeal via all or a subset of user migration from on-premise to the Microsoft cloud. Leverage powerful secure self service option for password resets, account unlock for both premise and | office 365 | Azure AD cloud. Keep the passwords in sync between on premise domain to | office 365 | Azure AD cloud.

Tuesday, January 21, 2020

Active Directory Management Tools

CionSystems products are easy to use, reliable, and scalable and supply more functionality than the other vendors complicated heavy duty enterprise product during this space. Our product solves the enterprise problem, truly reduce their cost and don't add management overhead cost. Our key differentiating factors are our solution's ease-of-user features and therefore the ability to field a real , web-based solution which will be securely utilized from any system, anywhere within the world. Our products works with Active Directory / OpenLDAP / Office365 / Azure / Salesforce/ Google apps and address the important issues companies face in production.Our solutions are installed in under hour and have shown ROI on the primary day of use.

Azure active directory services

loud Identity Management Tool (Azure) and CionSystems´ cloud based Identity and Access Management (IAM) Solution, CMT, may be a centralized on premise enterprise to Microsoft | Office 365 | Azure AD cloud identity integration, Azure Active Directory Services, access and management solution. It automates user de-provisioning, provisioning, collects auditing data for compliances. It enables migration to the Microsoft cloud piecemeal via all or a subset of user migration from on-premise to the Microsoft cloud. Leverage powerful secure self service option for password resets, account unlock for both premise and | office 365 | Azure AD cloud. Keep the passwords in sync between on premise domain to | office 365 | Azure AD cloud.


Azure Active Directory (Azure Ad) & OpenLdap Management

Now supporting Microsoft Azure AD and Microsoft Office 365.

CionSystems Cloud Identity Minder may be a cloud-based identity, authentication and self service user life cycle management solution. Azure Active Directory (Azure ad) & OpenLdap management tool make your application work with any Identity store located anywhere with simple and straightforward integration to your SaaS, web or traditional application. You not got to add special code for every Identity store. the answer provides auditing and workflow also . Additionally, the appliance doesn’t got to remember of the Identity store there by allowing Identities to remain within the confine of existing location (on premise or cloud). the answer are often deployed in enterprise DMZ or within the cloud.
                                            Ad GPO Management



Group Policy Objects (GPOs) are constructs that are stored within Active Directory that allow IT administrators to regulate a good sort of security settings and access permissions. samples of how GPOs are typically used include:

Group Policy allows users administrators to implement specific configurations for users and computers. Group Policy settings are contained in Group Policy objects (GPOs), which are linked to the subsequent Active Directory service containers: sites, domains, or organizational units (OUs).