tenfold vs. 8MAN - a comparison

Philosophy

tenfold: IAM - Unified Identity and Access Management - Comprehensive management of identities with simultaneous management of authorizations based on processes in an open system via interfaces based on standards. The system can be controlled very well from the outside and also control other systems via its open interfaces. On the one hand it supports standards and is therefore easy to integrate and is nevertheless open enough to control and manage other systems directly. 8MAN: AAM - AD Account and Access Management - Management of AD accounts and permissions in the closed system of the Microsoft world. Rather as a supplement to the AD-Console to understand. Interfaces to external systems are limited.

8MAN
compare yourself

General

Visualization of permissions

You can see at a glance which persons have which authorizations and can understand how they came about. Insignificant technical details are hidden for better clarity.

Reporting permissions

Generate reports on the authorization situation, transparently and in an easy-to-understand way. Insignificant technical details are hidden for the end user.

Administration

IT administrators or data owners assign new authorizations at the click of a mouse. The necessary structures (group authorizations) are generated automatically.

Automation

tenfold helps you to automate and document the processes in user and authorization management.

Documentation

All changes are documented audit-proof in the system. The entire history of all users and permissions is saved. A later manipulation of data is excluded.

Self service

Users can submit applications themselves via an intuitive, web-based interface, for example for additional authorizations. Or about data changes, such as changing the mobile number.

For users

Which help desk manager is not? PasswordResets take up a large part of the available capacities.
Give your users a way to reset passwords in Active Directory®, SAP, and other applications. Support for secret questions, SMS PINs and Google® Authenticator. The passwords for other connected systems can also be reset.

For the help desk

If it is not possible or not desired to make the function directly available to the users, the helpdesk has the option to validate persons for the reset (Caller Verification). Automatically generated initial passwords also save valuable time.

Approval workflows

Flexible workflows ensure that changes are never made without the approval of the responsible person.

User administration

Life Cycle

The entire life cycle of an employee is covered. Processes such as admission, data changes, internal bills of exchange and exit can be automated via workflows.

Manual input

Personal data can be entered manually via the interface.

Import from CSV file

Personal data can be automatically taken over from a CSV file and are then adjusted accordingly in the AD. Entries, withdrawals and changes to master data are automatically recognized by tenfold. Prerequisite: The CSV file must be generated by the HR system used.

Import from other sources

Personal data can be exported via database queries, web services or function calls from the HR system. The attribute settings are freely configurable.

mass changes

Often, a large amount of user data has to be created or changed. Easily make changes to your data in Microsoft Excel® and make the bulk change with an easy file upload.

Future requests

Do you want changes to user data or authorizations to be activated at a later date? No problem: enter the changes and enter an activation date. The changes are stored as future requests in the system and activated only on the desired date.

connectivity

Microsoft Active Directory Management

Easily manage users, attributes, group properties, and group memberships from one interface. Both single and multi-forest environments supported.
.

Microsoft File Share Management

Manage access permissions on Windows shares including required list permissions to Microsoft Best Practices.

Microsoft Exchange Server Management

Manage the mailboxes and public folders on an Exchange Server and customize out-of-office notes and agents.

Microsoft SharePoint Server Management

Manage the permissions of SharePoint Web applications in a simple and over-the-top way.

System Center Configuration Manager

Control the roll out of client packages or other administrative activities of the SCCM.

Unix File Shares Management

Manage the permissions and accounts on UNIX / Linux servers.

Business Application Management

Integrate your role-based business applications. Manage the permissions in
Your ERP, CRM or DMS. Increase compliance in your organization through transparent entitlement management.

Directory services and groupware solutions

In large system environments, Active Directory and Exchange often include other groupware solutions and directory services. For example, the integration of Novell eDirectory or Lotus Notes via standard LDAP interfaces.

Service Management Solutions

It often makes sense to integrate Service Management in the context of user and authorization management. The solution supports the integration of systems such as TopDesk, OTRS, HelpMatics, iET and others.

Software Distribution

Use the user management to make software packages available to users. Either as an individual service, such as a Microsoft Office® package or as part of an overall deployment, such as rolling out the SAP GUI® after the server-side setup of the SAP user.

Own solutions

Critical data is often found in self-developed applications. The solution has numerous possibilities to integrate self-developed applications: SQL interfaces, RFC / RPC, Web services, import / export and many more.

 

Templates & profiles

Administration

Using templates (profiles), certain organizational units can be represented in terms of authorization. Templates can be configured via the interface by the administrator.

Active Directory® basic permissions

By assigning templates to specific employees, they automatically receive the basic authorizations required for your department or branch.

Cross-system basic authorizations

Cross-system assignment of basic authorizations possible. For example, you can automatically assign roles in SAP® or in other applications based on the Org affiliation.

additional permissions

In addition, desired additional authorizations can be requested. The approval workflow automatically obtains the release of the responsible data owner.

Automatic changes

If the employee in question changes to another organizational unit, the basic authorizations are automatically adjusted - if necessary, with a time delay.

Adjustments to the templates

If a template is adapted, the changes can be automatically rolled out to all employees who have assigned the template.

Legend:
  - stands for "fully supported"
  - stands for "only with extension / additional costs"
  - stands for "not possible"