{"id":21092,"date":"2021-03-18T11:43:17","date_gmt":"2021-03-18T10:43:17","guid":{"rendered":"https:\/\/staging.dev.firstattribute.com\/?page_id=21092"},"modified":"2024-12-17T10:58:08","modified_gmt":"2024-12-17T09:58:08","slug":"iam-hybrid","status":"publish","type":"page","link":"https:\/\/www.firstattribute.com\/en\/iam-hybrid\/","title":{"rendered":"IAM Hybrid"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row css_animation=&#8221;fadeIn&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; el_class=&#8221;FA-aligncenter&#8221;][vc_column][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;&#8221; el_class=&#8221;p&#8221;]\n<h1 id=\"iam\" style=\"font-size: 2.8em;\">Hybrid IAM<\/h1>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;FA-alignleft&#8221;][vc_column_text css_animation=&#8221;none&#8221; css=&#8221;&#8221;]\n<h2 style=\"text-align: left;\">Identity &amp; access management in hybrid<br \/>\nIT environments<\/h2>\n[\/vc_column_text][vc_column_text css_animation=&#8221;none&#8221; css=&#8221;&#8221;]\n<p>We are experts in easy-to-use, delegated identity and access management for both on-premises and cloud-based IT environments.<\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;FA-aligncenter&#8221;][vc_column_text css_animation=&#8221;bounceInRight&#8221; css=&#8221;.vc_custom_1733470622500{margin-top: 50px !important;}&#8221; el_class=&#8221;runde-ecken&#8221;]\n<p><img decoding=\"async\" class=\"runde-ecken alignnone wp-image-39587 size-full\" title=\"Hybrid identity and access management with IDM-Portal\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/shutterstock_272163653-1.jpg\" alt=\"Hybrid identity and access management with IDM-Portal\" width=\"1000\" height=\"667\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/shutterstock_272163653-1.jpg 1000w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/shutterstock_272163653-1-300x200.jpg 300w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/shutterstock_272163653-1-768x512.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; background_color=&#8221;#eff5ff&#8221;][vc_column css=&#8221;.vc_custom_1587738490710{padding-bottom: 10px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1733140807330{border-bottom-width: 2px !important;padding-bottom: 10px !important;}&#8221; el_class=&#8221;pleft&#8221;]\n<h2 style=\"text-align: center;\">What is hybrid IAM?<\/h2>\n[\/vc_column_text][vc_column_text css=&#8221;&#8221;]\n<p class=\"absatz\">Hybrid IT landscapes with<strong> server-client and cloud infrastructure<\/strong> are the norm today. Hybrid IAM means Identity and Access Management (IAM) in an IT landscape where identities merge in both worlds. Tailored on-premises solutions and scalable cloud applications present challenges to organisations because there is no 100% compatibility.<\/p>\n[\/vc_column_text][vc_column_text css=&#8221;&#8221;]\n<p><strong>3 success factors for hybrid identity management:<\/strong><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;body { color: blue; }&#8221;][vc_column_text css=&#8221;&#8221;]\n<p><img decoding=\"async\" class=\"aligncenter wp-image-39503 size-medium\" title=\"IAM solution for hybrid IT environments - IDM-Portal\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/IAM-solution-for-Entra-ID-and-AD-231x300.png\" alt=\"IAM solution for hybrid IT environments\" width=\"231\" height=\"300\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/IAM-solution-for-Entra-ID-and-AD-231x300.png 231w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/IAM-solution-for-Entra-ID-and-AD.png 543w\" sizes=\"(max-width: 231px) 100vw, 231px\" \/><\/p>\n[\/vc_column_text][vc_column_text css=&#8221;&#8221;]\n<p><strong>1. Administrators use a central IAM solution:<\/strong> IT specialists can manage on-premises and cloud directories in a fast and customizable application.<\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;&#8221;]\n<p><img decoding=\"async\" class=\"aligncenter wp-image-39505 size-medium\" title=\"Role-based delegation in IDM-Portal\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/Delegation-and-IAM-229x300.png\" alt=\"Role-based delegation in IDM-Portal\" width=\"229\" height=\"300\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/Delegation-and-IAM-229x300.png 229w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/Delegation-and-IAM.png 543w\" sizes=\"(max-width: 229px) 100vw, 229px\" \/><\/p>\n[\/vc_column_text][vc_column_text css=&#8221;&#8221;]\n<p><strong>2. Delegation to employees:<\/strong> Users receive granular access rights, take over IAM data processing and carry out administrative tasks themselves.<\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;&#8221;]\n<p><img decoding=\"async\" class=\"aligncenter wp-image-39507 size-medium\" title=\"Security of the IAM solution has top priority\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/Secure-IAM-solution-231x300.png\" alt=\"Security of the IAM solution has top priority\" width=\"231\" height=\"300\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/Secure-IAM-solution-231x300.png 231w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/Secure-IAM-solution.png 546w\" sizes=\"(max-width: 231px) 100vw, 231px\" \/><\/p>\n[\/vc_column_text][vc_column_text css=&#8221;&#8221;]\n<p><strong>3. Security is the focus:<\/strong> Company guidelines, security workflows, automated processes and audits are all integrated into the background.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;yes&#8221; background_color=&#8221;#EFF5FF&#8221;][vc_column][vc_column_text css=&#8221;&#8221;]\n<p><a href=\"https:\/\/www.firstattribute.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener\"><button class=\"ButtonBeratung2 aligncenter\">Get advice now<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1732025162221{margin-top: 20px !important;padding-bottom: 50px !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; el_class=&#8221;pleft&#8221;]\n<h2 style=\"text-align: center;\">Distributed identities as the basis for hybrid IAM<\/h2>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; fullwidth=&#8221;yes&#8221; top_margin=&#8221;-80&#8243; bottom_margin=&#8221;0&#8243;][vc_column width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:95px;\"><\/div><\/div>[vc_column_text css=&#8221;.vc_custom_1734428318371{padding-right: 30px !important;}&#8221;]\n<p><img decoding=\"async\" class=\"runde-ecken alignnone wp-image-39585 size-full\" title=\"Hybrid identity and access management with IDM-Portal\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/shutterstock_2459023493.jpg\" alt=\"\" width=\"1000\" height=\"667\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/shutterstock_2459023493.jpg 1000w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/shutterstock_2459023493-300x200.jpg 300w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/shutterstock_2459023493-768x512.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]\n<h3>Increase in digital identities<\/h3>\n<p class=\"absatz\">Most organizations in the Microsoft world use Entra ID and Active Directory for their identity and access management. In addition, companies <strong>work with many additional applications<\/strong> to manage identities and contacts.<\/p>\n<p class=\"absatz\">With the <strong>increase of digital identities<\/strong>, the challenge of maintaining control is growing. Classic IAM systems, which only cover internal identities, have long since become obsolete. <strong>The future of identity and access management lies in dealing with diverse, distributed identities.<\/strong><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; fullwidth=&#8221;yes&#8221; top_margin=&#8221;-80&#8243; bottom_margin=&#8221;0&#8243; css=&#8221;.vc_custom_1733142395013{padding-top: 60px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]\n<h3>Distributed identity management<\/h3>\n<p class=\"absatz\">Managing these <strong>distributed identities<\/strong> in such a way that everyone is available and everyone only has the access they need is one of the great challenges of our time.<\/p>\n<p class=\"absatz\">Whether this is done in a central system such as the IDM-Portal or distributed across different systems is a company-specific decision. With the <a href=\"\/\/www.firstware.com\/en\/\u201d\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener\">IDM-Portal<\/a> and the <a href=\"\/\/my-iam.com\/en\/\u201d\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener\">my-IAM platform<\/a>, you are well prepared for the <strong>digital transformation<\/strong> of identity and access management.<\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:100px;\"><\/div><\/div>[vc_column_text css=&#8221;&#8221;]\n<p><img decoding=\"async\" class=\"aligncenter wp-image-39414 size-large\" title=\"Digital transformation with FirstAttribute\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/11\/Ready-for-digitalization-1024x521.png\" alt=\"Digital transformation with FirstAttribute\" width=\"1024\" height=\"521\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/11\/Ready-for-digitalization-1024x521.png 1024w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/11\/Ready-for-digitalization-300x153.png 300w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/11\/Ready-for-digitalization-768x391.png 768w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/11\/Ready-for-digitalization.png 1353w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;none&#8221; fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; background_color=&#8221;#eff5ff&#8221;][vc_column css=&#8221;.vc_custom_1732020630800{margin-bottom: -30px !important;}&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pleft&#8221;]\n<h2 style=\"text-align: center;\">IDM-Portal as a solution for hybrid IAM<\/h2>\n[\/vc_column_text][vc_column_text css=&#8221;&#8221;]\n<p style=\"text-align: center;\">The IDM-Portal simplifies user administration in mixed IT environments, automates permissions with approvals and time control, and integrates third-party systems for efficient identity management.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;none&#8221; fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; background_color=&#8221;#eff5ff&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]\n<h3>User and authorization management<\/h3>\n<p class=\"absatz\">Hybrid IAM involves the combination of two technological worlds with different approaches that are not fully compatible. If the company relies on <strong>on-premises Active Directory<\/strong>, the user lifecycle is under local control. If the company manages <strong>identities in the Microsoft cloud<\/strong>, Entra ID is used. Often, both directories are in use.<\/p>\n<p class=\"\u2018absatz\u2019\">In practice, the best approach depends on the primary user management system. The IDM-Portal can work with both directories and manage them in parallel.<\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:50px;\"><\/div><\/div>[vc_column_text css_animation=&#8221;none&#8221; css=&#8221;.vc_custom_1733145268319{margin-top: 50px !important;}&#8221;]\n<p><a href=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/Hybrid-IAM-IDM-Portal.png\" target=\"_blank\" rel=\"noopener\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\"><img decoding=\"async\" class=\"aligncenter wp-image-39516 size-large\" title=\"\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/Hybrid-IAM-IDM-Portal-1024x591.png\" alt=\"User and authorization management with IDM-Portal\" width=\"1024\" height=\"591\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/Hybrid-IAM-IDM-Portal-1024x591.png 1024w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/Hybrid-IAM-IDM-Portal-300x173.png 300w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/Hybrid-IAM-IDM-Portal-768x443.png 768w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/Hybrid-IAM-IDM-Portal-1536x887.png 1536w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/Hybrid-IAM-IDM-Portal-2048x1182.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;none&#8221; fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; background_color=&#8221;#eff5ff&#8221;][vc_column width=&#8221;1\/2&#8243;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:10px;\"><\/div><\/div>[vc_column_text css_animation=&#8221;none&#8221; css=&#8221;.vc_custom_1733146093761{margin-top: 50px !important;}&#8221;]\n<p><img decoding=\"async\" class=\"alignnone wp-image-20471\" title=\"Roles, security and reporting\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/03\/Zugriffsberechtigung-write-read-hide-special-access-1.png\" alt=\"Roles, security and reporting\" width=\"500\" height=\"287\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/03\/Zugriffsberechtigung-write-read-hide-special-access-1.png 638w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/03\/Zugriffsberechtigung-write-read-hide-special-access-1-300x172.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]\n<h3>Roles, security and reporting<\/h3>\n<p class=\"absatz\">IAM has the task of preventing unauthorized access to resources, documents and applications. To do this, the technical concept of <strong>authorization groups<\/strong> is used in almost all solutions, whether cloud or on-premises.<\/p>\n<p class=\"\u201cabsatz\u201d\">In addition to user roles, it is crucial for content-related IAM security. <strong>Traceability<\/strong> or IAM reporting, who changed what and when, is important for <strong>security audits<\/strong>.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;20&#8243; css=&#8221;.vc_custom_1732015345502{margin-top: 20px !important;padding-bottom: 60px !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; el_class=&#8221;pleft&#8221;]\n<h2 style=\"text-align: center;\">Benefits of the IDM-Portal<\/h2>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;body { color: blue; }&#8221;]<div class=\"shortcode-wrapper shortcode-icon-box clearfix hb-animate-element hb-fade-in\"><div class=\"feature-box alternative aligncenter\"><div class=\"hb-icon-wrapper\"><i class=\"hb-moon-wand-2 ic-holder-1\"><\/i><\/div><div class=\"feature-box-content\"><div class=\"hb-small-break\"><\/div><p>\n<h3>High flexibility through configurability<\/h3>\n<p>The IDM portal can be customized as a tailored IAM solution to precisely fit the needs of the company.<\/p>\n<\/p><\/div><\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243;]<div class=\"shortcode-wrapper shortcode-icon-box clearfix hb-animate-element hb-fade-in\"><div class=\"feature-box alternative aligncenter\"><div class=\"hb-icon-wrapper\"><i class=\"hb-moon-users-4 ic-holder-1\"><\/i><\/div><div class=\"feature-box-content\"><div class=\"hb-small-break\"><\/div><p>\n<h3>Central administration<br \/>\nin Entra ID and AD<\/h3>\n<p>Cloud groups as well as AD data can be managed directly and quickly via a clear and intuitive interface.<\/p>\n<\/p><\/div><\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243;]<div class=\"shortcode-wrapper shortcode-icon-box clearfix hb-animate-element hb-fade-in\"><div class=\"feature-box alternative aligncenter\"><div class=\"hb-icon-wrapper\"><i class=\"hb-moon-tree-4 ic-holder-1\"><\/i><\/div><div class=\"feature-box-content\"><div class=\"hb-small-break\"><\/div><p>\n<h3 style=\"text-align: center;\">Practical<br \/>\nmulti-domain capability<\/h3>\n<p>The integration of different domains in the IDM portal makes it easy to manage multiple companies.<\/p>\n<\/p><\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; css_animation=&#8221;fadeIn&#8221; fullwidth=&#8221;yes&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; el_class=&#8221;FA-aligncenter&#8221; background_color=&#8221;#eff5ff&#8221;][vc_column css=&#8221;.vc_custom_1732014937287{margin-bottom: -50px !important;}&#8221;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;&#8221; el_class=&#8221;p&#8221;]\n<h2>FirstWare IDM-Portal &#8211; IAM solution for your identities<\/h2>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;6\/12&#8243; el_class=&#8221;FA-alignleft&#8221;]<div class=\"shortcode-wrapper shortcode-spacer clearfix\"><div class=\"spacer\" style=\"height:90px;\"><\/div><\/div>[vc_single_image image=&#8221;39334&#8243; img_size=&#8221;large&#8221; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;FA-alignleft&#8221;][vc_column_text css_animation=&#8221;none&#8221; css=&#8221;.vc_custom_1733146854380{padding-top: 20px !important;}&#8221; el_class=&#8221;FA-aligncenter&#8221;]\n<p><!-- Abschnitt 5 --><\/p>\n<h2 style=\"text-align: center;\">Tailored<br \/>\nidentity management<\/h2>\n<p style=\"text-align: center;\"><strong>Fast access \u2013 all in one place.<\/strong><\/p>\n<p class=\"absatz\" style=\"text-align: center;\"><strong>Automatic, centralized and secure.<\/strong><\/p>\n<ul class=\"featureList\">\n<li class=\"tick\" style=\"text-align: center;\">High <strong>customizability<\/strong><\/li>\n<li class=\"tick\" style=\"text-align: center;\"><strong>Fast access<\/strong> to Entra ID and AD<\/li>\n<li class=\"tick\" style=\"text-align: center;\"><strong>Delegation<\/strong> with role-based scope<\/li>\n<li class=\"tick\" style=\"text-align: center;\"><b>Automated authorizations<\/b><\/li>\n<li class=\"tick\" style=\"text-align: center;\">Traceability for <strong>audits<\/strong><\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text css=&#8221;&#8221;]\n<p><a href=\"https:\/\/www.firstware.com\/en\/\"><button class=\"ButtonBeratung aligncenter\">Go to IDM-Portal website<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row top_margin=&#8221;0&#8243; bottom_margin=&#8221;-60&#8243;][vc_column][vc_column_text css=&#8221;&#8221;]\n<h2 style=\"text-align: center;\">Contact<\/h2>\n<p class=\"absatz\" style=\"text-align: center;\">You can reach us at<\/p>\n<p class=\"absatz\" style=\"color: #003a93; font-size: 1.2em; text-align: center;\"><a href=\"tel:+4981969984330\">+49 81 969 984 330<\/a><\/p>\n<p class=\"absatz\" style=\"text-align: center;\">or through our<\/p>\n[\/vc_column_text][vc_column_text css=&#8221;&#8221;]\n<p style=\"text-align: center;\"><a href=\"https:\/\/my-iam.com\/de\/\" target=\"_blank\" rel=\"noopener\"><button class=\"ButtonBeratung aligncenter\">Contact form<\/button><\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8221;fadeIn&#8221; top_margin=&#8221;0&#8243; bottom_margin=&#8221;0&#8243; el_class=&#8221;FA-aligncenter&#8221;][vc_column][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;&#8221; el_class=&#8221;p&#8221;] Hybrid IAM [\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;FA-alignleft&#8221;][vc_column_text css_animation=&#8221;none&#8221; css=&#8221;&#8221;] Identity &amp; access management in [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-21092","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IAM Hybrid - Azure AD &amp; AD infrastructure - FirstAttribute AG<\/title>\n<meta name=\"description\" content=\"IAM Hybrid - Identity, Authorization &amp; Compliance Management based on AD, AAD, and your users with FirstWare IDM Portal\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firstattribute.com\/en\/iam-hybrid\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IAM Hybrid - Azure AD &amp; AD infrastructure - FirstAttribute AG\" \/>\n<meta property=\"og:description\" content=\"IAM Hybrid - Identity, Authorization &amp; Compliance Management based on AD, AAD, and your users with FirstWare IDM Portal\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firstattribute.com\/en\/iam-hybrid\/\" \/>\n<meta property=\"og:site_name\" content=\"FirstAttribute\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-17T09:58:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/shutterstock_272163653-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/iam-hybrid\\\/\",\"url\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/iam-hybrid\\\/\",\"name\":\"IAM Hybrid - Azure AD & AD infrastructure - FirstAttribute AG\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/iam-hybrid\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/iam-hybrid\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firstattribute.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/shutterstock_272163653-1.jpg\",\"datePublished\":\"2021-03-18T10:43:17+00:00\",\"dateModified\":\"2024-12-17T09:58:08+00:00\",\"description\":\"IAM Hybrid - Identity, Authorization & Compliance Management based on AD, AAD, and your users with FirstWare IDM Portal\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/iam-hybrid\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/iam-hybrid\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/iam-hybrid\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.firstattribute.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/shutterstock_272163653-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.firstattribute.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/shutterstock_272163653-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/iam-hybrid\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IAM Hybrid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/\",\"name\":\"FirstAttribute AG\",\"description\":\"Identity Access Management, Active Directory Spezialisten\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#organization\",\"name\":\"FirstAttribute AG\",\"url\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firstattribute.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/FIRSTATTRIBUTE-Logo2013-final-700x145px.png\",\"contentUrl\":\"https:\\\/\\\/www.firstattribute.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/FIRSTATTRIBUTE-Logo2013-final-700x145px.png\",\"width\":700,\"height\":145,\"caption\":\"FirstAttribute AG\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IAM Hybrid - Azure AD & AD infrastructure - FirstAttribute AG","description":"IAM Hybrid - Identity, Authorization & Compliance Management based on AD, AAD, and your users with FirstWare IDM Portal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firstattribute.com\/en\/iam-hybrid\/","og_locale":"en_US","og_type":"article","og_title":"IAM Hybrid - Azure AD & AD infrastructure - FirstAttribute AG","og_description":"IAM Hybrid - Identity, Authorization & Compliance Management based on AD, AAD, and your users with FirstWare IDM Portal","og_url":"https:\/\/www.firstattribute.com\/en\/iam-hybrid\/","og_site_name":"FirstAttribute","article_modified_time":"2024-12-17T09:58:08+00:00","og_image":[{"url":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/shutterstock_272163653-1.jpg","type":"","width":"","height":""}],"twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.firstattribute.com\/en\/iam-hybrid\/","url":"https:\/\/www.firstattribute.com\/en\/iam-hybrid\/","name":"IAM Hybrid - Azure AD & AD infrastructure - FirstAttribute AG","isPartOf":{"@id":"https:\/\/www.firstattribute.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firstattribute.com\/en\/iam-hybrid\/#primaryimage"},"image":{"@id":"https:\/\/www.firstattribute.com\/en\/iam-hybrid\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/shutterstock_272163653-1.jpg","datePublished":"2021-03-18T10:43:17+00:00","dateModified":"2024-12-17T09:58:08+00:00","description":"IAM Hybrid - Identity, Authorization & Compliance Management based on AD, AAD, and your users with FirstWare IDM Portal","breadcrumb":{"@id":"https:\/\/www.firstattribute.com\/en\/iam-hybrid\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firstattribute.com\/en\/iam-hybrid\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstattribute.com\/en\/iam-hybrid\/#primaryimage","url":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/shutterstock_272163653-1.jpg","contentUrl":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/shutterstock_272163653-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firstattribute.com\/en\/iam-hybrid\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.firstattribute.com\/en\/"},{"@type":"ListItem","position":2,"name":"IAM Hybrid"}]},{"@type":"WebSite","@id":"https:\/\/www.firstattribute.com\/en\/#website","url":"https:\/\/www.firstattribute.com\/en\/","name":"FirstAttribute AG","description":"Identity Access Management, Active Directory Spezialisten","publisher":{"@id":"https:\/\/www.firstattribute.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firstattribute.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firstattribute.com\/en\/#organization","name":"FirstAttribute AG","url":"https:\/\/www.firstattribute.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstattribute.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/FIRSTATTRIBUTE-Logo2013-final-700x145px.png","contentUrl":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/FIRSTATTRIBUTE-Logo2013-final-700x145px.png","width":700,"height":145,"caption":"FirstAttribute AG"},"image":{"@id":"https:\/\/www.firstattribute.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/pages\/21092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/comments?post=21092"}],"version-history":[{"count":8,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/pages\/21092\/revisions"}],"predecessor-version":[{"id":39448,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/pages\/21092\/revisions\/39448"}],"wp:attachment":[{"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/media?parent=21092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}