Solution
Strengthen your governance
IAM
Control my
onboarding workflows
Automate the creation of
user accesses
Features
Connectors
Resources
Articles
Use cases
Events
About
Documentation
Pricing
Request a demo
Login
30-day trial
Sitemap
Main pages
Articles
Shadow AI: a new risk for enterprise access governance
How can you support growth and HR flows without complicating identity management?
IT onboarding and offboarding: a strategic guide to securing the employee lifecycle
The 10 most common vulnerabilities detected during a code audit
How Chateauform automated its identity management while keeping control of its accesses
NIS2 without IAM? Mission impossible.
SSO and IAM: confusion undermines access security
What are the best IAM solutions in 2025?
Company mergers: the strategic (and all too often underestimated) role of the IT manager
From manual headaches to fluid management: Youzer at the service of firefighters
Why IAM has become a strategic imperative for cybersecurity
Identity management: granting access to third parties without compromising the security of information systems
Dstny takes up the challenge of growth by optimizing the management of its user accounts
Recertifying user accounts: how a French transport company rose to the challenge ahead of the 2024 Olympic Games
Optimize your Active Directory: A complete guide to cleaning up inactive accounts
IT Offboarding: Best Practices for Ensuring Data Security
Identity Lifecycle Management: the key to security and productivity
What is identity and access automation?
Proxiserve automates its 1000 arrivals and departures of temporary workers and service providers
NIS 2 regulation, let's take stock of the issues, obligations and sanctions
The Basque Country community is abandoning its paper forms for automated onboarding.
IT onboarding: key points for success
Atoll fully automates its onboardings and offboardings.
A transport player saves time on the supervision of its application accounts
Bring ROI to your IAM project: concrete arguments
7 best practices for identity and access management
How EM Normandie now onboards its students without friction
Self-Service Password Reset: The key to enhanced productivity at work
Shadow IT: The challenges of using unregulated software
What is application account provisioning?
How did Sewan streamline and automate its user movements?
Create your IT request validation workflows in 6 steps
Automate IT resource request approval workflows
How did Skill&You save time and improve reliability in its audits?
Centralize users when you have multiple HR sources
Identity governance and administration: the key to effective management
License management: a challenge for the IT department
Know your users!
How to automate your entitlement management with an IAM tool?
How did BTP Consultants restructure and automate its onboarding and offboarding process?
Active Directory: How to grant access to non-technical users?
What risks do you take by not implementing entitlement management?
5 good reasons why you'll love MFA/2FA
IT Onboarding: Steps to Follow for a Successful Integration
How to use HR data to configure application access accounts?
How to create your user repository
How to connect my HRIS and my Active Directory?
Software to perform a review of accounts and entitlements
SSO, Single Sign-On: obvious choice or bad idea?
What is a ghost account and how to detect them on your Active Directory
That moment when cybersecurity depends on a post-it note
How to automate user accounts on Active Directory?
The 10 most repetitive actions performed by the IT department that can be automated!
Understanding Active Directory and its operation with an IAM
How to identify the applications used in your company
Is an offboarding process really necessary?
HR and IT: An on-again, off-again relationship!
What role does the manager play in access management?
How does a Fintech company secure its users' access?
The Landes SDIS (Fire and Rescue Service) successfully manages a large user flow.
Identity and Access Management: What is it?
7 criteria for an identity and access management solution that suits you
The 7 pitfalls to avoid when choosing your IAM solution
Succeeding with your IAM project: everything you need to know!
HR and IT Onboarding, why it's crucial to do both
Manage departures: the hacker is your former user.
How to manage accounts shared between users?