SuggestSoft.com

User Provisioning

Softerra Adaxes 2009.1

Softerra Adaxes 2009.1: Management facilitation, security tightening, administration enhancement. user lifecycle management achieved with cross-domain Active Directory management facilities, granularly distributed role-based security, streamline user provisioning, administrative tasks automation, and approval based workflow. Centralizing AD management, Softerra Adaxes ensures controlled access to Active Directory resources not only from any web-browser, but also from a convenient windows-based admin console. Now you may easily modify your own






Active Directory Report Software 1.0.5: Software to create reports about number of accounts in Active Directory
Active Directory Report Software 1.0.5

user accounts and their status. ADRS counts the number of user accounts per Organizational Unit (OU) or per domain and offers an overview of disabled, enabled and stale user accounts. ADRS queries the Active Directory and directly displays the results on the screen. Windows does not offer any convenient method for quickly gaining insight into the number of user accounts in Active Directory. ADRS allows you to determine the exact number of enabled

reporting, rbac, user accounts, stale, workflow management, report, software, active directory, enabled user accounts, licensing, user provisioning, identity management, disabled user accounts





Secret User Pro 2.4: Create a hidden Windows user account and use your PC without leaving any history
Secret User Pro 2.4

User Pro allows you to easily create hidden Windows user accounts. With Secret User Pro, you`ll never need to delete internet history, recent file lists or personal files. The files within a Secret User Pro account are automatically protected from other users and will not show up in file searches made by other users. Secret User Pro accounts are properly hidden. They do not show on the welcome screen or in the "documents and settings" or "users"

hide user account, clearing history, history, internet history, hidden files, file protection, privacy software, secret user accounts, hidden user accounts, delete internet history, delete history, online privacy, security



Active Directory User Editor 1.0.0.0: Ever wanted to delegate editing of User content to HR or Admin staff?
Active Directory User Editor 1.0.0.0

User Editor, End users can edit user content without getting in touch with sensitive profile data. Using Active Directory User Editor, you can let the receptionists or team leaders manage all phone records, name and address management while IT staff takes care of the IT related tasks in the user profiles. With Active Directory User Editor you can safely let non tech staff to edit user related content as it is not possible to delete users or other

active, update active directory, directory, active directory manager, edit active directory users, delegate, edit active directory content, management



NetWrix Inactive Users Tracker 3.0.106: Automatically disables inactive user accounts based on last logon time
NetWrix Inactive Users Tracker 3.0.106

user account, leave it untouched for many days, and then use it to perform malicious activity against an organization. Another example is employee retirement: User accounts are usually disabled when an employee quits an organization. Most HR databases only keep information about "primary" user account, but what if a user had additional user accounts? Inactive Users Tracker automates the management of inactive user accounts. The program periodically

real last logon, disable inactive user, true last logon, freeware, block inactive user, identity management



LASsie for MS Access 5.0: A library you can reference to implement form/rpt level security in MS Access.
LASsie for MS Access 5.0

user`s sign on/user name. LASsie includes a friendly user sign-on form that prompts for a login user name and password. Users can change their own passwords via the included "change password" form. Optionally, the sign-on form can be bypassed and the user`s Windows login user name can be used. Once the user name is verified, the security groups that the user belongs to are loaded. Based on permissions/restrictions assigned to these groups, LASsie

filter, access, permission, protect, restrict, user level, microsoft, password, security, sign on, grant



LASsie 5.0: A library you can reference to implement form/rpt level security in MS Access.
LASsie 5.0

user`s sign on/user name. LASsie includes a friendly user sign-on form that prompts for a login user name and password. Users can change their own passwords via the included `change password` form. Optionally, the sign-on form can be bypassed and the user`s Windows login user name can be used. Once the user name is verified, the security groups that the user belongs to are loaded. Based on permissions/restrictions assigned to these groups, LASsie

filter, access, permission, protect, restrict, user level, microsoft, password, security, sign on, grant


More Results: 1  2  3  4  5  6  

World IT News