Hi, we have been waiting for a year for the implementation of a Multi Factor Athentification method in ARM. This feature is essential for a rights management system with which you can destroy parts of an AD if you are compromised. I am therefore again drawing attention to the implementation. regards Ingo
Hallo community, Since this summer we use more and more the functions of MS Teams (chatting, video calls, project work in teams, file exchange). It would be very helpful if permissions for individual teams and other functions could be monitored in ARM. Since teams run via Sharepoint, you could certainly develop something…
We are using ARM GrantMa to delegate Group Membership administration to data owners. But whenever the data owners assign an AD account to an AD group using GrantMa, there is no feedback at all when clicking on the "Execute action" button in the wizard. It would be great, if there could be any kind of feedback from ARM if…
Not a SQL expert be any means so excuse me if the explanation is wrong here. Rather than running a report on ARM, it would be more convenient to query an SQL table with the same data as stored in the report. Currently this does not seem to be possible
In ARM it is only possible to deactivate or activate the ARM License. When Deactivating the license, the License scope is lost and has to be reentered. It would be nice to have a Re-activate-Button in addition to the Deactivate-Button. This is necessary when you have no internet connection so that the Product is not…
It would be great, if ARM could do the following 2 tasks for AD computer objects: 1. enable/disable computer objects with ARM rich client and ARM web client 2. move more than one computer object at the same time from one OU/container to another (typically, I would expect such a feature in the ARM web client only) Maybe…
Objective: To enhance the recertification interface of SolarWinds Access Rights Manager (ARM) by including more detailed Active Directory (AD) group information. Current Limitation: In the recertification process, users are limited to viewing only the AD group names and their corresponding OUs, with the Alias addition…
It would be very useful if Arm could scan / detect files (csv, txt, powershell etc) for username / password combinations in any form so we could detect/remove any offending items.
New Feature to link Active Directory SIDs from multiple Domains (if you scan multiple domains)
As ARM extends privileged access to normal BAU accounts, or requires the use of passwords to enable privileged access accounts to perform change actions in AD and on servers, would it be possible to add and MFA option for accessing ARM.
It looks like you're new here. Sign in or register to get started.