tenfold vs. 8MAN - a comparison
Philosophy |
|
tenfold: IAM - Unified Identity and Access Management - Comprehensive management of identities with simultaneous management of authorizations based on processes in an open system via interfaces based on standards. The system can be controlled very well from the outside and also control other systems via its open interfaces. On the one hand it supports standards and is therefore easy to integrate and is nevertheless open enough to control and manage other systems directly. | 8MAN: AAM - AD Account and Access Management - Management of AD accounts and permissions in the closed system of the Microsoft world. Rather as a supplement to the AD-Console to understand. Interfaces to external systems are limited. |
8MAN compare yourself |
|||
General |
|||
Visualization of permissionsYou can see at a glance which persons have which authorizations and can understand how they came about. Insignificant technical details are hidden for better clarity. |
|||
Reporting permissionsGenerate reports on the authorization situation, transparently and in an easy-to-understand way. Insignificant technical details are hidden for the end user. |
|||
AdministrationIT administrators or data owners assign new authorizations at the click of a mouse. The necessary structures (group authorizations) are generated automatically. |
|||
Automationtenfold helps you to automate and document the processes in user and authorization management. |
|||
DocumentationAll changes are documented audit-proof in the system. The entire history of all users and permissions is saved. A later manipulation of data is excluded. |
|||
Self serviceUsers can submit applications themselves via an intuitive, web-based interface, for example for additional authorizations. Or about data changes, such as changing the mobile number. |
|||
For usersWhich help desk manager is not? PasswordResets take up a large part of the available capacities. |
|||
For the help deskIf it is not possible or not desired to make the function directly available to the users, the helpdesk has the option to validate persons for the reset (Caller Verification). Automatically generated initial passwords also save valuable time. |
|||
Approval workflowsFlexible workflows ensure that changes are never made without the approval of the responsible person. |
|||
User administration |
|||
Life CycleThe entire life cycle of an employee is covered. Processes such as admission, data changes, internal bills of exchange and exit can be automated via workflows. |
|||
Manual inputPersonal data can be entered manually via the interface. |
|||
Import from CSV filePersonal data can be automatically taken over from a CSV file and are then adjusted accordingly in the AD. Entries, withdrawals and changes to master data are automatically recognized by tenfold. Prerequisite: The CSV file must be generated by the HR system used. |
|||
Import from other sourcesPersonal data can be exported via database queries, web services or function calls from the HR system. The attribute settings are freely configurable. |
|||
mass changesOften, a large amount of user data has to be created or changed. Easily make changes to your data in Microsoft Excel® and make the bulk change with an easy file upload. |
|||
Future requestsDo you want changes to user data or authorizations to be activated at a later date? No problem: enter the changes and enter an activation date. The changes are stored as future requests in the system and activated only on the desired date. |
|||
connectivity |
|||
Microsoft Active Directory ManagementEasily manage users, attributes, group properties, and group memberships from one interface. Both single and multi-forest environments supported. |
|||
Microsoft File Share ManagementManage access permissions on Windows shares including required list permissions to Microsoft Best Practices. |
|||
Microsoft Exchange Server ManagementManage the mailboxes and public folders on an Exchange Server and customize out-of-office notes and agents. |
|||
Microsoft SharePoint Server ManagementManage the permissions of SharePoint Web applications in a simple and over-the-top way. |
|||
System Center Configuration ManagerControl the roll out of client packages or other administrative activities of the SCCM. |
|||
Unix File Shares ManagementManage the permissions and accounts on UNIX / Linux servers. |
|||
Business Application ManagementIntegrate your role-based business applications. Manage the permissions in |
|||
Directory services and groupware solutionsIn large system environments, Active Directory and Exchange often include other groupware solutions and directory services. For example, the integration of Novell eDirectory or Lotus Notes via standard LDAP interfaces. |
|||
Service Management SolutionsIt often makes sense to integrate Service Management in the context of user and authorization management. The solution supports the integration of systems such as TopDesk, OTRS, HelpMatics, iET and others. |
|||
Software DistributionUse the user management to make software packages available to users. Either as an individual service, such as a Microsoft Office® package or as part of an overall deployment, such as rolling out the SAP GUI® after the server-side setup of the SAP user. |
|||
Own solutionsCritical data is often found in self-developed applications. The solution has numerous possibilities to integrate self-developed applications: SQL interfaces, RFC / RPC, Web services, import / export and many more. |
|||
Templates & profiles |
|||
AdministrationUsing templates (profiles), certain organizational units can be represented in terms of authorization. Templates can be configured via the interface by the administrator. |
|||
Active Directory® basic permissionsBy assigning templates to specific employees, they automatically receive the basic authorizations required for your department or branch. |
|||
Cross-system basic authorizationsCross-system assignment of basic authorizations possible. For example, you can automatically assign roles in SAP® or in other applications based on the Org affiliation. |
|||
additional permissionsIn addition, desired additional authorizations can be requested. The approval workflow automatically obtains the release of the responsible data owner. |
|||
Automatic changesIf the employee in question changes to another organizational unit, the basic authorizations are automatically adjusted - if necessary, with a time delay. |
|||
Adjustments to the templatesIf a template is adapted, the changes can be automatically rolled out to all employees who have assigned the template. |
Legend:
- stands for "fully supported"
- stands for "only with extension / additional costs"
- stands for "not possible"