vUNITE AGENDA

After hosting One Identity UNITE for five years without a hiccup, the pandemic has given us pause for thought. However, that pause was not for long. With the restrictions placed upon every country on our planet, we’ve had to adapt. UNITE is going digital – vUNITE – it includes all the elements that make this world-class event such a success. Join us for an action-packed, one-day, virtual event at where you will learn, collaborate and have fun. 

The work we do together enables and secures virtual life, remote working and safe collaboration. One Identity will unite customers, partners and product experts from all over the globe to attend, share and discuss topics that matter to your industry and organizations. The focus of vUNITE includes the three core tenets of security: identity governance, privileged access management and Active Directory account lifestyle management. 

What to Expect at vUNITE:

8:30 a.m. EST/ 2:30 p.m. CET

Welcome to vUNITE

8:30 a.m. EST/ 2:30 p.m. CET

Welcome to vUNITTE

9 a.m. EST/ 3 p.m. CET
AIRING 1

PAM Breakout

How Safeguard supports Cloud

In this session we will review some recent enhancements to Safeguard that can help you deploy, manage and monitor cloud infrastructure. Istvan will demonstrate how you can control and monitor privileged accounts for both on-prem and cloud managed MS SQL. In addition, he will show some pre-release technology around controlling and monitoring web consoles. Finally, Istvan will demonstrate our public cloud offerings. 

Presentor: Istvan Jagrl, Safeguard Product Owner

Just-in-time provisioning of Active Directory

Active Directory is easily the most widely used directory, with statistics stating that over 90% of organizations using it for access management. For this reason, it’s a given that attackers are after Active Directory. It touches nearly everything and once it is controlled by an attacker then they can take, destroy, or ransom anything. Active Directory breaches are usually accomplished by breaking in then elevating privilege to an admin level. The phrase “get the DA” (Domain Admin) is common in the attacker community. Active Roles is specially designed to remove the need to wide-spread permissions in Active Directory and Safeguard is designed to store privileged credentials When they work together, layers of security are multiplied. Join Daniel Conrad as he demonstrates Active Roles Just- In-Time Provisioning with Safeguard which allows privileges to be assigned only at the time of a credential check- out and removed at check-in.

Presenter: Daniel Conrad, Technical Strategist

Frictionless DevOps Secrets Management in Safeguard

Modern application architecture and development techniques are changing the way we think about security and secrets management.  Continuous integration, continuous deployment, infrastructure as code, configuration as code, orchestrators, and pipelines need to be automated securely while avoiding friction between development and IT.  Join us as Dan Peterson, Safeguard Distinguished Engineer, shows how Safeguard can help your organization to securely move at the speed of DevOps.

Presenter: Dan Peterson, Safeguard Distinguished Engineer

What's new Sudo 1.9

Attend this session to learn about changes in Sudo, version 1.9. Todd Miller will highlight changes to the Sudo Plugin interface, showcase the new centralized session recording functionality, and provide a short tutorial on writing Sudo plugins in Python. Finally, we will discuss some of the lesser-
known features of Sudo.

Presenter: Todd Miller, Sudo
Maintainer

9 a.m. EST/ 3 p.m. CET
AIRING 1

IGA Breakout

One Identity Manager and Where we are Today

One Identity Manager has made some great strides to become IGA MQ leader. leader. In this session, Alex Binotto and Matthias Bauer discuss core use cases and share plans for the future, and highlight ways to ease the transition of Oracle-based implementations to MS SQL.

Presenters: Alex Binotto, Senior Product Manager and Matthias Bauer, Director of Product Engineering

OIGA Path to SaaS

Identity Manager can govern access to on-premises, cloud and hybrid resources from request through fulfillment for users and data. We’ve now expanded Identity Manager to consume SaaS services and offerings from our Starling platform to provide expanded scope and additional capabilities. Attend this session to learn about all of our new Starling services for Identity Manager including: connector services to SaaS apps, cloud-delivered access certification and cloud-delivered access
request.

Presenter: Alex Binotto, Senior Product Manager

Time to Prove Applications are under Governance

Application owners will use this new discipline to prove applications are under governance and create a framework for managing business applications consisting of entitlements and roles. Once defined, the entitlements and roles within a business application can be published as self-service items by the owner.

Presenters: Alex Binotto, Senior Product Manager and Hanno Bunjes, Software Engineering Manager

Get more out of your Identity Manager Investment

Integrations with Identity Manager ensure the success of your IGA program. Learn what current integrations are available and what value an Identity Manager implementation bring to ITSM (ServiceNow) driven access request scenario. 

Presenters: Robert Kraczek, Global strategist and Bruce Esposito, Global Strategist

9 a.m. EST/ 3 p.m. CET
AIRING 1

AD Breakout

Top Six "Cool Things" You Can Do with Active Roles

Learn the top six high impact uses of Active Roles that delight and benefit both users and AD admins to provide dramatic increases in efficiency and security. In this session, we’ll cover: User and Group Management; Automation; Admin delegation; Expanded Scope; Workflows; and Reporting.

Presenter: Dave Miles, Senior Product Manager

How to Maximize your Active Roles for the Cloud

For organizations moving to the cloud, the security and account lifecycle management of their environments is critical but challenging. In this session, we’ll cover how Active Roles positions you for cloud-readiness, share options for deploying on prem vs. in the cloud, and cover Azure and AWS uses. Learn how Active Roles delivers the support and power needed for a hybrid AD environment and beyond – creating a path to IGA.

Presenter: Daniel Conrad, Field Engineer & Wayne Smiley, Senior Product Architect

Making Active Roles your Go-To AD Account Lifecycle Management solution for Saas Apps

Learn how Active Roles can manage cloud-based systems using the “easy button” of Starling Connect and/or the SCIM standard.  This session will cover provisioning to cloud-based applications and from SCIM compliant applications with Starling Connect.

Presenter: Gary Busby, Solutions Engineer and Danny Ferri, Product Manager

The Request Object: The Heart of Active Roles

In this advanced session, seasoned Active Roles users will cover some advanced concepts of Active Roles
requests, workflows, and policies — and how and when to use them. Learn more about different requests that the Web UI issues when making a request (Get, GetPolicyInformation,
CheckPropertyValues, Create). Gain an understanding of how a request is processed with the security check, pre-processing, op execution and post-processing stages.

Presenter:  Chris Rudd, Consulting Lead, One Identity

9 a.m. EST/ 3 p.m. CET
AIRING 1

PAM Breakout

How Safeguard supports Cloud

In this session we will review some recent enhancements to Safeguard that can help you deploy, manage and monitor cloud infrastructure. Istvan will demonstrate how you can control and monitor privileged accounts for both on-prem and cloud managed MS SQL. In addition, he will show some pre-release technology around controlling and monitoring web consoles. Finally, Istvan will demonstrate our public cloud offerings. 

Presentor: Istvan Jagrl, Safeguard Product Owner

IGA Breakout

One Identity Manager and Where we are Today

One Identity Manager has made some great strides to become IGA MQ leader. leader. In this session, Alex Binotto and Matthias Bauer discuss core use cases and share plans for the future, and highlight ways to ease the transition of Oracle-based implementations to MS SQL.

Presenters: Alex Binotto, Senior Product Manager and Matthias Bauer, Director of Product Engineering

AD Breakout

Top Six "Cool Things" You Can Do with Active Roles

Learn the top six high impact uses of Active Roles that delight and benefit both users and AD admins to provide dramatic increases in efficiency and security. In this session, we’ll cover: User and Group Management; Automation; Admin delegation; Expanded Scope; Workflows; and Reporting.

Presenter: Dave Miles, Senior Product Manager

11 a.m. EST/ 5 p.m. CET

Welcome to vUNITE

Keynote: The Pursuit of the World’s Best: Darrell Long, President & General Manager, One Identity

One Identity Technology Vision: Bruce Esposito, Global Strategist, One Identity

And the Survey Says: Insights gained from the annual One Identity Global Survey: Todd Peterson, Director Product Marketing

I don’t want to be the last person in the data center!: Robert Kraczek, Global Strategist, One Identity

Just-in-time provisioning of Active Directory

Active Directory is easily the most widely used directory, with statistics stating that over 90% of organizations using it for access management. For this reason, it’s a given that attackers are after Active Directory. It touches nearly everything and once it is controlled by an attacker then they can take, destroy, or ransom anything. Active Directory breaches are usually accomplished by breaking in then elevating privilege to an admin level. The phrase “get the DA” (Domain Admin) is common in the attacker community. Active Roles is specially designed to remove the need to wide-spread permissions in Active Directory and Safeguard is designed to store privileged credentials When they work together, layers of security are multiplied. Join Daniel Conrad as he demonstrates Active Roles Just- In-Time Provisioning with Safeguard which allows privileges to be assigned only at the time of a credential check- out and removed at check-in.

Presenter: Daniel Conrad, Technical Strategist

OIGA Path to SaaS

Identity Manager can govern access to on-premises, cloud and hybrid resources from request through fulfillment for users and data. We’ve now expanded Identity Manager to consume SaaS services and offerings from our Starling platform to provide expanded scope and additional capabilities. Attend this session to learn about all of our new Starling services for Identity Manager including: connector services to SaaS apps, cloud-delivered access certification and cloud-delivered access
request.

Presenter: Alex Binotto, Senior Product Manager

How to Maximize your Active Roles for the Cloud

For organizations moving to the cloud, the security and account lifecycle management of their environments is critical but challenging. In this session, we’ll cover how Active Roles positions you for cloud-readiness, share options for deploying on prem vs. in the cloud, and cover Azure and AWS uses. Learn how Active Roles delivers the support and power needed for a hybrid AD environment and beyond – creating a path to IGA.

Presenter: Daniel Conrad, Field Engineer & Wayne Smiley, Senior Product Architect

1:10 p.m. EST/ 7:10 p.m. CET
AIRING 2

PAM Breakout

How Safeguard supports Cloud

In this session we will review some recent enhancements to Safeguard that can help you deploy, manage and monitor cloud infrastructure. Istvan will demonstrate how you can control and monitor privileged accounts for both on-prem and cloud managed MS SQL. In addition, he will show some pre-release technology around controlling and monitoring web consoles. Finally, Istvan will demonstrate our public cloud offerings. 

Presentor: Istvan Jagrl, Safeguard Product Owner

Just-in-time provisioning of Active Directory

Active Directory is easily the most widely used directory, with statistics stating that over 90% of organizations using it for access management. For this reason, it’s a given that attackers are after Active Directory. It touches nearly everything and once it is controlled by an attacker then they can take, destroy, or ransom anything. Active Directory breaches are usually accomplished by breaking in then elevating privilege to an admin level. The phrase “get the DA” (Domain Admin) is common in the attacker community. Active Roles is specially designed to remove the need to wide-spread permissions in Active Directory and Safeguard is designed to store privileged credentials When they work together, layers of security are multiplied. Join Daniel Conrad as he demonstrates Active Roles Just- In-Time Provisioning with Safeguard which allows privileges to be assigned only at the time of a credential check- out and removed at check-in.

Presenter: Daniel Conrad, Technical Strategist

Frictionless DevOps Secrets Management in Safeguard

Modern application architecture and development techniques are changing the way we think about security and secrets management.  Continuous integration, continuous deployment, infrastructure as code, configuration as code, orchestrators, and pipelines need to be automated securely while avoiding friction between development and IT.  Join us as Dan Peterson, Safeguard Distinguished Engineer, shows how Safeguard can help your organization to securely move at the speed of DevOps.

Presenter: Dan Peterson, Safeguard Distinguished Engineer

What's new Sudo 1.9

Attend this session to learn about changes in Sudo, version 1.9. Todd Miller will highlight changes to the Sudo Plugin interface, showcase the new centralized session recording functionality, and provide a short tutorial on writing Sudo plugins in Python. Finally, we will discuss some of the lesser-
known features of Sudo.

Presenter: Todd Miller, Sudo
Maintainer

Frictionless DevOps Secrets Management in Safeguard

Modern application architecture and development techniques are changing the way we think about security and secrets management.  Continuous integration, continuous deployment, infrastructure as code, configuration as code, orchestrators, and pipelines need to be automated securely while avoiding friction between development and IT.  Join us as Dan Peterson, Safeguard Distinguished Engineer, shows how Safeguard can help your organization to securely move at the speed of DevOps.

Presenter: Dan Peterson, Safeguard Distinguished Engineer

Time to Prove Applications are under Governance

Application owners will use this new discipline to prove applications are under governance and create a framework for managing business applications consisting of entitlements and roles. Once defined, the entitlements and roles within a business application can be published as self-service items by the owner.

Presenters: Alex Binotto, Senior Product Manager and Hanno Bunjes, Software Engineering Manager

Making Active Roles your Go-To AD Account Lifecycle Management solution for Saas Apps

Learn how Active Roles can manage cloud-based systems using the “easy button” of Starling Connect and/or the SCIM standard.  This session will cover provisioning to cloud-based applications and from SCIM compliant applications with Starling Connect.

Presenter: Gary Busby, Solutions Engineer and Danny Ferri, Product Manager

1:10 p.m. EST/ 7:10 p.m. CET
AIRING 2

IGA Breakout

One Identity Manager and Where we are Today

One Identity Manager has made some great strides to become IGA MQ leader. leader. In this session, Alex Binotto and Matthias Bauer discuss core use cases and share plans for the future, and highlight ways to ease the transition of Oracle-based implementations to MS SQL.

Presenters: Alex Binotto, Senior Product Manager and Matthias Bauer, Director of Product Engineering

OIGA Path to SaaS

Identity Manager can govern access to on-premises, cloud and hybrid resources from request through fulfillment for users and data. We’ve now expanded Identity Manager to consume SaaS services and offerings from our Starling platform to provide expanded scope and additional capabilities. Attend this session to learn about all of our new Starling services for Identity Manager including: connector services to SaaS apps, cloud-delivered access certification and cloud-delivered access
request.

Presenter: Alex Binotto, Senior Product Manager

Time to Prove Applications are under Governance

Application owners will use this new discipline to prove applications are under governance and create a framework for managing business applications consisting of entitlements and roles. Once defined, the entitlements and roles within a business application can be published as self-service items by the owner.

Presenters: Alex Binotto, Senior Product Manager and Hanno Bunjes, Software Engineering Manager

Get more out of your Identity Manager Investment

Integrations with Identity Manager ensure the success of your IGA program. Learn what current integrations are available and what value an Identity Manager implementation bring to ITSM (ServiceNow) driven access request scenario. 

Presenters: Robert Kraczek, Global strategist and Bruce Esposito, Global Strategist

What's new Sudo 1.9

Attend this session to learn about changes in Sudo, version 1.9. Todd Miller will highlight changes to the Sudo Plugin interface, showcase the new centralized session recording functionality, and provide a short tutorial on writing Sudo plugins in Python. Finally, we will discuss some of the lesser-
known features of Sudo.

Presenter: Todd Miller, Sudo
Maintainer

Get more out of your Identity Manager Investment

Integrations with Identity Manager ensure the success of your IGA program. Learn what current integrations are available and what value an Identity Manager implementation bring to ITSM (ServiceNow) driven access request scenario. 

Presenters: Robert Kraczek, Global strategist and Bruce Esposito, Global Strategist

The Request Object: The Heart of Active Roles

In this advanced session, seasoned Active Roles users will cover some advanced concepts of Active Roles
requests, workflows, and policies — and how and when to use them. Learn more about different requests that the Web UI issues when making a request (Get, GetPolicyInformation,
CheckPropertyValues, Create). Gain an understanding of how a request is processed with the security check, pre-processing, op execution and post-processing stages.

Presenter:  Chris Rudd, Consulting Lead, One Identity

1:10 p.m. EST/ 7:10 p.m. CET
AIRING 2

AD Breakout

Top Six "Cool Things" You Can Do with Active Roles

Learn the top six high impact uses of Active Roles that delight and benefit both users and AD admins to provide dramatic increases in efficiency and security. In this session, we’ll cover: User and Group Management; Automation; Admin delegation; Expanded Scope; Workflows; and Reporting.

Presenter: Dave Miles, Senior Product Manager

How to Maximize your Active Roles for the Cloud

For organizations moving to the cloud, the security and account lifecycle management of their environments is critical but challenging. In this session, we’ll cover how Active Roles positions you for cloud-readiness, share options for deploying on prem vs. in the cloud, and cover Azure and AWS uses. Learn how Active Roles delivers the support and power needed for a hybrid AD environment and beyond – creating a path to IGA.

Presenter: Daniel Conrad, Field Engineer & Wayne Smiley, Senior Product Architect

Making Active Roles your Go-To AD Account Lifecycle Management solution for Saas Apps

Learn how Active Roles can manage cloud-based systems using the “easy button” of Starling Connect and/or the SCIM standard.  This session will cover provisioning to cloud-based applications and from SCIM compliant applications with Starling Connect.

Presenter: Gary Busby, Solutions Engineer and Danny Ferri, Product Manager

The Request Object: The Heart of Active Roles

In this advanced session, seasoned Active Roles users will cover some advanced concepts of Active Roles
requests, workflows, and policies — and how and when to use them. Learn more about different requests that the Web UI issues when making a request (Get, GetPolicyInformation,
CheckPropertyValues, Create). Gain an understanding of how a request is processed with the security check, pre-processing, op execution and post-processing stages.

Presenter:  Chris Rudd, Consulting Lead, One Identity

11 a.m. EST/ 5 p.m. CET

Welcome to vUNITE

Keynote: The Pursuit of the World’s Best: Darrell Long, President & General Manager, One Identity

One Identity Technology Vision: Bruce Esposito, Global Strategist, One Identity

And the Survey Says: Insights gained from the annual One Identity Global Survey: Todd Peterson, Director Product Marketing

I don’t want to be the last person in the data center!: Robert Kraczek, Global Strategist, One Identity

1:10 p.m. EST/ 7:10 p.m. CET
AIRING 2

PAM Breakout

How Safeguard supports Cloud

In this session we will review some recent enhancements to Safeguard that can help you deploy, manage and monitor cloud infrastructure. Istvan will demonstrate how you can control and monitor privileged accounts for both on-prem and cloud managed MS SQL. In addition, he will show some pre-release technology around controlling and monitoring web consoles. Finally, Istvan will demonstrate our public cloud offerings. 

Presentor: Istvan Jagrl, Safeguard Product Owner

IGA Breakout

One Identity Manager and Where we are Today

One Identity Manager has made some great strides to become IGA MQ leader. leader. In this session, Alex Binotto and Matthias Bauer discuss core use cases and share plans for the future, and highlight ways to ease the transition of Oracle-based implementations to MS SQL.

Presenters: Alex Binotto, Senior Product Manager and Matthias Bauer, Director of Product Engineering

AD Breakout

Top Six "Cool Things" You Can Do with Active Roles

Learn the top six high impact uses of Active Roles that delight and benefit both users and AD admins to provide dramatic increases in efficiency and security. In this session, we’ll cover: User and Group Management; Automation; Admin delegation; Expanded Scope; Workflows; and Reporting.

Presenter: Dave Miles, Senior Product Manager

Just-in-time provisioning of Active Directory

Active Directory is easily the most widely used directory, with statistics stating that over 90% of organizations using it for access management. For this reason, it’s a given that attackers are after Active Directory. It touches nearly everything and once it is controlled by an attacker then they can take, destroy, or ransom anything. Active Directory breaches are usually accomplished by breaking in then elevating privilege to an admin level. The phrase “get the DA” (Domain Admin) is common in the attacker community. Active Roles is specially designed to remove the need to wide-spread permissions in Active Directory and Safeguard is designed to store privileged credentials When they work together, layers of security are multiplied. Join Daniel Conrad as he demonstrates Active Roles Just- In-Time Provisioning with Safeguard which allows privileges to be assigned only at the time of a credential check- out and removed at check-in.

Presenter: Daniel Conrad, Technical Strategist

OIGA Path to SaaS

Identity Manager can govern access to on-premises, cloud and hybrid resources from request through fulfillment for users and data. We’ve now expanded Identity Manager to consume SaaS services and offerings from our Starling platform to provide expanded scope and additional capabilities. Attend this session to learn about all of our new Starling services for Identity Manager including: connector services to SaaS apps, cloud-delivered access certification and cloud-delivered access
request.

Presenter: Alex Binotto, Senior Product Manager

How to Maximize your Active Roles for the Cloud

For organizations moving to the cloud, the security and account lifecycle management of their environments is critical but challenging. In this session, we’ll cover how Active Roles positions you for cloud-readiness, share options for deploying on prem vs. in the cloud, and cover Azure and AWS uses. Learn how Active Roles delivers the support and power needed for a hybrid AD environment and beyond – creating a path to IGA.

Presenter: Daniel Conrad, Field Engineer & Wayne Smiley, Senior Product Architect

Frictionless DevOps Secrets Management in Safeguard

Modern application architecture and development techniques are changing the way we think about security and secrets management.  Continuous integration, continuous deployment, infrastructure as code, configuration as code, orchestrators, and pipelines need to be automated securely while avoiding friction between development and IT.  Join us as Dan Peterson, Safeguard Distinguished Engineer, shows how Safeguard can help your organization to securely move at the speed of DevOps.

Presenter: Dan Peterson, Safeguard Distinguished Engineer

Time to Prove Applications are under Governance

Application owners will use this new discipline to prove applications are under governance and create a framework for managing business applications consisting of entitlements and roles. Once defined, the entitlements and roles within a business application can be published as self-service items by the owner.

Presenters: Alex Binotto, Senior Product Manager and Hanno Bunjes, Software Engineering Manager

Making Active Roles your Go-To AD Account Lifecycle Management solution for Saas Apps

Learn how Active Roles can manage cloud-based systems using the “easy button” of Starling Connect and/or the SCIM standard.  This session will cover provisioning to cloud-based applications and from SCIM compliant applications with Starling Connect.

Presenter: Gary Busby, Solutions Engineer and Danny Ferri, Product Manager

What's new Sudo 1.9

Attend this session to learn about changes in Sudo, version 1.9. Todd Miller will highlight changes to the Sudo Plugin interface, showcase the new centralized session recording functionality, and provide a short tutorial on writing Sudo plugins in Python. Finally, we will discuss some of the lesser-
known features of Sudo.

Presenter: Todd Miller, Sudo
Maintainer

Get more out of your Identity Manager Investment

Integrations with Identity Manager ensure the success of your IGA program. Learn what current integrations are available and what value an Identity Manager implementation bring to ITSM (ServiceNow) driven access request scenario. 

Presenters: Robert Kraczek, Global strategist and Bruce Esposito, Global Strategist

The Request Object: The Heart of Active Roles

In this advanced session, seasoned Active Roles users will cover some advanced concepts of Active Roles
requests, workflows, and policies — and how and when to use them. Learn more about different requests that the Web UI issues when making a request (Get, GetPolicyInformation,
CheckPropertyValues, Create). Gain an understanding of how a request is processed with the security check, pre-processing, op execution and post-processing stages.

Presenter:  Chris Rudd, Consulting Lead, One Identity

Deep Dive Technical Sessions

Identity Manager + SAP

Get introduced to basic SAP R/3 principles and the SAP cloud platform and how we integrate with these systems. Deep dive into our support for on-premise SAP modules like HCM/OM, SAP user and role management, SAP authorization model and SAP SoD as well as SAP cloud systems like SAP Cloud Platform, SAP SuccessFactors and SAP Concur.

Identity Manager: The Unknown Unknowns

None of us can claim 100% knowledge of the functionality and integration capabilities offered by this powerful and rapidly evolving IGA platform. So, come and see how to easily achieve some valuable use- cases using techniques that you didn’t even know you didn’t know! We will present a choice selection of techniques, design patterns and good practice inspired by customer use-cases and recent product innovations. You will find the methods are reusable and applicable for your own scenarios and contexts.

Active Roles: Hybrid Environments

Struggling with your Hybrid AD environment? Learn how Active Roles can help with the growing number of hybrid environments, which can be difficult to manage and secure if managed via manual processes. This session will share scenarios in which you can easily implement with the help of Active Roles: multi forest, lifecycle, license, mailbox, SaaS based accounts and lots of other real-life management use cases.

Privileged access Management: PAMdora's box - revealed

In the ancient past, hope was the only thing remaining in Pandora’s box. We have come a long way since these days. Join this session to learn what else besides hope is needed in the box now.

Log Management: He who controls the logs controls the universe

Some companies think that they see it all. But can you ensure that all the relevant information gets collected from your systems before analyzing and visualizing it? Are there any ways to optimize the costs associated with logs without losing important data? Join this session to find out!

Privileged Account Governance

Get a complete view of all your identities and privilege rights from a single console. This view should include standard accounts and privileged accounts. Deep dive into the concepts behind Privileged Account Governance (PAG) and how to use Safeguard with Identity Manager to achieve PAG.