Overview

Deploy Active Roles from AWS Marketplace
Active Roles allows you to manage and protect user and group accounts using automated task provisioning on directory objects, going above and beyond what is offered by native tools. Active Roles provides automation for consistent enforcement of corporate policies, an administrative model that allows you to delegate permissions based on role, and flexible, rule-based views across your entire AD identity environment via a consolidated single console. These features and more create a reliable and secure environment for distributed administration and account provisioning, allowing you to do your job faster.
Highlights
- Delegate least-privilege permissions based on role to ensure all identities and groups have proper privileges
- Consolidate all AD domains with Entra ID and M365 tenants onto a single console, ensuring better visibility and control over your entire AD/Entra ID/M365 environment
- Use automation to ensure accuracy and consistency of policy creation and enforcement and track changes to support your auditing and compliance reporting needs
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
All fees are non-refundable and non-cancellable except as required by law.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Additional details
Usage instructions
To access the application launch a new EC2 instance from this AMI and connect to it via RDP.
For more information, see the Active Roles Quick Start Guide: https://support.oneidentity.com/technical-documents/active-roles/8.1.5/quick-start-guide
Resources
Support
Vendor support
Once contacted Sales, follow the steps in the link below under the section 'Installing and configuring Active Roles on the EC2 instance':
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Automation has transformed identity governance and now streamlines secure user lifecycle management
What is our primary use case?
My main use case for One Identity Active Roles is to simplify and secure the management of Microsoft Active Directory . In day-to-day work, it is mainly used for automating user lifecycle tasks such as creating, modifying, and disabling user accounts. Instead of doing everything manually, we can use workflows and policies to ensure it is done consistently.
Automation with workflows and policies in One Identity Active Roles has really reduced the amount of repetitive manual work I used to do in Microsoft Active Directory . Earlier, tasks such as user creation were completely manual. I had to create the account, assign groups, set attributes, and double-check everything. It was time-consuming and easy to miss something. Now with workflows and policies in place, most of that is automated. For example, when a new employee joins, I just trigger the process or it comes through a request. The workflow automatically creates the account, applies the correct naming convention, assigns groups based on the role or department, and even routes approval if needed.
Along with automation and diligence, one more important thing I would highlight is governance and compliance with One Identity Active Roles. Every change in Microsoft Active Directory is tracked, so we are always having a clear audit trail. That becomes really useful during audits or security reviews because we can easily show who made what changes and when. Also, the ability to enforce least privilege access is a big advantage. Instead of giving broad admin rights, we can tightly control permissions, which reduces risk. Overall, beyond just making tasks easier, it adds a strong layer of control, security, and visibility of AD operations.
What is most valuable?
One Identity Active Roles offers a strong mix of automation, security, and control when managing Microsoft Active Directory. Some of the best features from my experience are delegation with least privilege. Instead of giving full access to admin, we can assign very specific permissions. That improves security and reduces risk. Second would be automation with workflows and policies. Routine tasks such as user creation, group assignments, and provisioning are automated, which saves time and ensures consistency. Third would be centralized management. We can manage multiple Active Directory domains, Azure AD , and even Microsoft 365 from one place, which simplifies administration. Fourth would be dynamic group management. Groups can be managed based on rules instead of manual updates, which is very helpful in large environments. And lastly, auditing and reporting. It tracks all changes, so we know who did what and when, which is important for compliance and troubleshooting.
Both centralized management and dynamic group management have made a big difference for our team while using One Identity Active Roles with Microsoft Active Directory. With centralized management, earlier we had to jump between different tools or consoles to manage users across domains or services. Now everything is available in one place. Whether it is user accounts or groups or permissions, we handle it from a single interface. A good example is during bulk onboarding. Instead of coordinating across multiple admins or tools, one person can manage everything end to end, which saves time and avoids confusion. Coming to dynamic group management, this has really reduced manual effort. Earlier, whenever someone changed departments or roles, we had to manually update their group memberships. That was not only time-consuming but also error-prone. Now groups are based on rules, department, or job title. So if a user attribute changes, their group membership updates automatically. For example, if someone moves from sales to marketing, they automatically get removed from sales-related access and added to marketing groups without any manual intervention.
Along with centralized and dynamic management, one feature I really find valuable in One Identity Active Roles is the approval workflow and auditing capabilities. For sensitive changes such as modifying group membership or access rights, we can enforce approvals before anything is applied. That adds an extra layer of control. At the same time, everything is logged. So in Microsoft Active Directory, we always have a clear audit trail of who made what changes and when. This is especially helpful during audits or when troubleshooting issues. Overall, beyond just making administration easy, these features help ensure proper governance, accountability, and security.
What needs improvement?
Overall, One Identity Active Roles is a very powerful tool, but there are definitely areas where it can be improved. One area is the user interface. It can feel a bit outdated and not as intuitive, especially for a new user. A more modern and user-friendly UI would improve adoption and reduce the learning curve. Another improvement area is integration and cloud support. While it works well with on-premises Active Directory, integration with Azure AD and other cloud systems can be better and more seamless. Also, dynamic group processing and performance can sometimes be challenging in large environments, especially when there are complex rules. Optimizing performance in such cases would help. From a governance perspective, features such as attention and certification could be stronger as they are important for compliance-heavy environments. Lastly, improving integration with third-party systems and simplifying customization would make it easier for organizations to adapt it to their needs.
Along with UI and integration, I think One Identity Active Roles could improve in a few operational areas. One is reporting and dashboards. While auditing is strong, the out-of-box reports can be a bit limited or not very visual. A more customizable and user-friendly dashboard would help teams quickly get insights without extra effort. Another area is troubleshooting and error visibility. Sometimes when workflows or policies fail, the error messages are not very clear, so it takes time to identify the root cause. Better logging and clearer error messages would make support easier. Also, upgrades and maintenance can be a bit complex. Simplifying version upgrades and reducing downtime would be beneficial, especially in large environments. Finally, training and documentation for new users could be improved. Since the tool is quite powerful, having more straightforward guides or built-in help would reduce the learning curve for new admins.
Some additional improvements I would suggest include better cloud-native capabilities. As organizations move more toward cloud-first strategies, having stronger native support beyond Microsoft Active Directory would be helpful. Simplified customization is another area where, while the tool is powerful, customizing workflows or policies can sometimes be complex. Making this more low-code or user-friendly would improve productivity. Lastly, faster performance in large environments would also help because in environments with many objects and complex rules, performance tuning can be challenging. Overall, it is a very solid and reliable solution, especially for AD management, but enhancing cloud readiness, usability, and performance would take it to the next level.
For how long have I used the solution?
I have been using One Identity Active Roles for more than a year now.
What do I think about the stability of the solution?
Overall, One Identity Active Roles is considered a stable and reliable solution based on both my experience and industry feedback. It is generally rated quite high for stability. Many users rate it around seven to nine out of ten. In day-to-day operations, it performs consistently, especially for core functions such as automation, delegation, and policy enforcement. There is typically no major downtime, and it handles routine Active Directory operations smoothly.
What do I think about the scalability of the solution?
I would say One Identity Active Roles is highly scalable, especially for medium to large enterprise environments. It is designed to manage multiple domains, users, and even hybrid environments from a single platform. It can scale horizontally by adding more servers such as multiple administration services and handle large volumes of users and groups effectively. For example, it supports managing multiple Active Directory domains, Azure AD tenants, and even cloud integration from one console, which makes it suitable for growing organizations. Scalability also depends on proper design such as SQL performance, network latency, and the complexity of your workflows or dynamic groups in a very large environment. You may need tuning to maintain performance. Overall, it scales very well, but as an enterprise tool, it needs proper architecture planning as well.
How are customer service and support?
My experience with customer support for One Identity Active Roles has been generally positive. The support team from One Identity is knowledgeable and understands the product well, especially for core areas such as workflows, delegations, and integration with Microsoft Active Directory. For standard issues, the response time is quite reasonable and the documentation and knowledge base are also helpful for troubleshooting. For more complex issues, it can sometimes take a bit longer as they may need deeper analysis or escalation, but they usually follow through until resolution. Overall, I would say the support is reliable and helpful, especially for enterprise environments, with occasional delays in more complex cases.
I would rate One Identity Active Roles customer support around eight out of ten. The main reason is that the support team from One Identity is knowledgeable and helpful, especially for standard issues and guidance around Microsoft Active Directory integration. They also provide good documentation and follow structured processes in resolving tickets.
Which solution did I use previously and why did I switch?
Before moving to One Identity Active Roles, we were mainly relying on native tools, which are in Microsoft Active Directory, such as the default AD users and computer consoles and some powerful shell scripts. While those tools work, they have limitations, especially in larger environments. The main challenges we faced were a lot of manual effort for routine tasks, no centralized control for standardization, difficult implementation of fine-grained delegation, limited automation and workflow capabilities, and lack of proper auditing and compliance tracking. That is why we decided to switch to One Identity Active Roles, where it provided automation for repetitive tasks, better delegation with least privilege, policy enforcement for consistency, and strong auditing and reporting.
How was the initial setup?
I would say integrating One Identity Active Roles with our existing infrastructure was moderate in terms of effort. It is not too difficult, but it does require proper planning. Since it is built to work closely with Active Directory, the core integration with on-premises AD was quite smooth. Connecting domains, syncing objects, and getting basic functionality up and running was straightforward. Where it gets a bit more involved is in customization and extended integrations. For example, setting up workflows based on business requirements and integrating with cloud services such as Azure AD. Also, configuring policies and delegation models properly requires a good understanding of both Active Directory structure and business processes. In large environments, planning things such as permissions, rules, and group structures upfront is important to avoid rework later. Overall, my assessment is that the initial setup is relatively smooth, especially for Active Directory, but achieving a fully automated, optimized, and customized implementation takes some time and expertise.
What was our ROI?
I have definitely seen a clear return on investment after implementing One Identity Active Roles, especially in terms of time-saving, efficiency, and reduced operational overhead in Microsoft Active Directory. To give a more direct example, I would add some points such as time saving on onboarding. Earlier, creating and configuring a user used to take around ten to fifteen minutes manually. With automation, it reduces to two to three minutes now. Another point is the reduction in manual workload. Routine tasks such as password resets and access requests are now delegated or automated. This reduces dependency on senior admins and allows the team to focus more on critical tasks. Third, we see fewer errors. With policy enforcing standards, we have seen a noticeable drop in issues such as incorrect permissions or missing attributes, which also reduces rework. For operational efficiency, instead of needing additional admin resources as the environment grows, the existing team can handle more workload due to automation. While it may not directly reduce headcount, it definitely avoids the need to hire more people.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing and licensing for One Identity Active Roles is that it is typically enterprise-oriented. The licensing is usually based on the number of enabled user accounts being managed in Active Directory, which makes it scalable as the organization grows. In terms of setup cost, there is an initial investment, not just for licensing, but also for implementation, such as setting up the environment, configuring workflows, and defining policies. If customization is involved, that can add to the cost as well. However, from a value perspective, it balances out over time because it reduces manual administrative effort, improves efficiency and productivity, and minimizes errors and security risks. While the upfront cost might feel on the higher side compared to native tools, the long-term benefits and operational savings make it worthwhile.
Which other solutions did I evaluate?
We did evaluate a few other options. We looked at native Microsoft Active Directory tools along with PowerShell scripting, but they lacked centralized management, automation, and strong delegation features. We also considered solutions such as ManageEngine ADManager Plus and Netwrix Auditor . ADManager Plus was good for basic automation and reporting, but it did not offer the same depth in delegation and policy control. Netwrix was strong in auditing and compliance, but it is more focused on monitoring rather than fully life-cycling management. The reason we chose One Identity Active Roles is that it offered a more complete solution combining automation, fine-grained delegation, policy enforcement, and auditing in one platform with strong integration with Active Directory. Overall, it gave us better control, scalability, and security compared to other options we evaluated.
What other advice do I have?
My impression of the automation capabilities provided by One Identity Active Roles is very positive. It is one of the strongest aspects of the tool and has really streamlined how we manage Microsoft Active Directory. A good example is user onboarding. Earlier, it was a fully manual process creating the account, assigning groups, and setting attributes. Now, with automation, when a request comes in, the workflow handles everything automatically. Account creation, applying naming conventions, assigning the right groups based on department or role, and even triggering approvals if required. Another example is offboarding as well. When an employee leaves, the system can automatically disable the account, remove access, and update attributes. This ensures nothing is missed and improves security. We also use automation for group management. Instead of manually adding users to groups, dynamic rules handle it based on attributes such as department or job title. Overall, automation has reduced manual effort, improved consistency, and minimized errors. It also speeds up the turnaround time for requests, which is a big advantage for both IT and end users.
One Identity Active Roles has significantly reduced both the complexity and workload of administrative tasks in Microsoft Active Directory. Earlier, many tasks were manual, such as creating users, assigning groups, and managing permissions, which not only took time, but also increased the chance of errors. With One Identity Active Roles, a lot of that complexity is abstracted through automation policies and delegations. For example, instead of remembering multiple steps for user provisioning, we now rely on workflows that handle everything consistently. It also simplifies administration by providing a centralized interface. We do not have to switch between multiple tools or consoles. From a workload perspective, repetitive tasks have reduced significantly. Things such as password resets, access requests, and group updates are either delegated or automated, which frees up time for more critical tasks.
My experience with delegation in One Identity Active Roles has been very positive and it has really improved how we manage day-to-day operations in Microsoft Active Directory. Earlier, most administrative tasks were handled by a small group of admins, which created bottlenecks, especially for routine requests such as password resets or account unlocks. With delegation, we have been able to distribute these tasks to different teams such as the helpdesk, but with very controlled permissions. For example, they can reset passwords or unlock accounts, but they do not have access to sensitive operations such as deleting users or modifying critical attributes. This has had a big impact on our workflow. It reduced dependency on senior admins, improved response time for user requests, reduced workload on the core IT team, and ensured better security through least privilege access.
We have actively used the fine-grained permission control feature in One Identity Active Roles and it has had a strong impact on implementing least privilege in Microsoft Active Directory. Instead of giving broad admin access, we have defined very specific permissions based on roles. For example, helpdesk users are only allowed to reset passwords or unlock accounts, but they cannot modify critical attributes or delete users. This level of control has significantly reduced the number of privileged accounts in the environment. It also minimizes the risk of accidental or unauthorized changes. Another benefit is that the permissions are tied to roles, not to individuals. So it is easier to manage when people change teams or responsibilities. Overall, it has helped us enforce least privilege in a practical way, giving users exactly the access they need and nothing more, thereby improving both security and accountability.
My main advice for anyone looking to implement One Identity Active Roles is to focus on planning and design upfront. First, clearly define your roles, permissions, and delegation model before implementation. One Identity Active Roles is very powerful, but if the structure is not planned well, it can become complex later. Second, start with basic automation and policies and then gradually expand. Trying to automate everything at once can make troubleshooting difficult. It is better to take a phased approach. Third, I would say to implement least privilege principles from the beginning. Design delegation carefully so users only get the access they need. This avoids rework and improves security. Overall, my advice would be to plan well, start simple, and scale gradually because One Identity Active Roles is a very powerful tool, but it works best with a structured approach. I give this solution an overall rating of nine out of ten.
Centralized automation has transformed directory governance and now secures delegated access
What is our primary use case?
I have been using One Identity Active Roles for approximately three to four years as a part of my role as a Senior System Administrator, where I gain hands-on experience in implementing and managing One Identity Active Roles for centralized Active Directory administration, including creating and managing access templates, configuring role-based access control, automating user provisioning and de-provisioning processes, setting up approval workflows, enforcing policies, and delegating administrative tasks securely, along with troubleshooting synchronization issues and integration with existing AD infrastructure to ensure compliance, operational efficiency, and reduced manual effort in a large enterprise environment.
My main use case for One Identity Active Roles is to centralize and streamline Active Directory administration by implementing secure delegation, automation, and governance control, where I primarily use it for automated user provisioning and de-provisioning based on HR triggers, applying role-based access control through access templates, enforcing naming and attribute policies, and managing group membership dynamically, along with configuring approval workflows for sensitive access requests to ensure compliance and audit readiness, while also reducing manual intervention for service desk teams when delegated limited administrative rights through One Identity Active Roles by giving direct access to the domain controller, thereby improving security and operational efficiency and consistency across the enterprise environment.
In my daily work, I use One Identity Active Roles to automate user onboarding and offboarding processes, where new users are automatically created with correct permissions, group memberships, and policies based on their role, and during offboarding, accounts are disabled and access removed instantly, which helps me to reduce manual effort, improve accuracy, and ensure better security and compliance.
What is most valuable?
The best features of One Identity Active Roles that stand out to me are mainly automation, delegation, and policy enforcement, as these provide me the most value in a real-world environment, where automation helps in streamlining user provisioning, de-provisioning, and group management through workflows, significantly reducing manual effort and errors, while fine-grained delegation allows secure role-based access control so that service desk or junior admins can perform limited tasks without giving full domain access, improving security and reducing the risk of privilege misuse, and policy enforcement ensures that all objects follow predefined standards like naming conventions, mandatory attributes, and compliance rules, maintaining consistency across the environment, along with strong workflow management and approval processes for sensitive changes, dynamic group management, and detailed auditing and reporting that help track every change for compliance and security purposes, making One Identity Active Roles a powerful tool for centralized, secure, and efficient identity and access management.
One feature that I feel is not highlighted enough is the powerful auditing and reporting capability in One Identity Active Roles, which provides detailed tracking of every change made within the Active Directory through One Identity Active Roles, including who performed the action, what changes were made, and when, making it extremely useful for compliance, security investigation, and troubleshooting, and in addition, the ability to customize workflows and scripts using PowerShell integration is also very valuable as it allows extending functionality based on business requirements, automate complex tasks, and integrate with other system solutions more adaptively to different needs.
In our organization, One Identity Active Roles is deployed in a hybrid environment, where the core One Identity Active Roles components such as the administration service and management console are hosted on-premises within our data center for better control and security, while it also integrates with cloud services like Azure AD to support hybrid identity and access scenarios, allowing us to manage both on-premises and cloud-based identities centrally, which provides flexibility, scalability, and aligns with our organization's gradual cloud adoption strategy.
What needs improvement?
One Identity Active Roles can be improved by enhancing its user interface to make it more modern and intuitive, as sometimes navigation and configuration feel complex for new users, and additionally, improving reporting and dashboard capabilities with more customizable and real-time analytics would add significant value, while better native integration with cloud platforms like Azure AD and hybrid environments could also strengthen support for evolving infrastructure needs, and simplifying workflow design with more visual and user-friendly options, along with improved performance during large-scale operations, would make it even more efficient and easier to manage the enterprise environment.
One specific issue I have encountered recently is that the interface and workflow configuration can become complex and less intuitive, especially when managing multiple approval steps or modifying existing workflows, which sometimes requires deeper scripting or backend adjustments, so more user-friendly and visual workflow design would be a great improvement, and as a wish-list item, I would like to see stronger, more seamless integration with cloud and hybrid environments like Azure AD, along with enhanced real-time reporting dashboards and easier troubleshooting tools, which would help in faster issue resolution and a better overall administration experience.
For how long have I used the solution?
I have been working in my current field for the last 12 years.
What do I think about the stability of the solution?
One Identity Active Roles is a very stable and reliable solution in our experience, as it runs reliably in production with minimal downtime and handles large-scale Active Directory environments efficiently, provided it is properly configured and maintained, and we have seen consistent performance in day-to-day operations like provisioning, delegation, and policy enforcement without major issues.
What do I think about the scalability of the solution?
One Identity Active Roles scales very well as the organization grows, as it is designed for enterprise environments and can handle a large number of users, groups, and directory objects efficiently, and in our experience, it has supported increasing workloads without performance issues, especially due to its centralized management, automation, and role-based delegation model, which allows us to scale the system to manage more identities without adding proportional administrative effort, and it also supports hybrid environments like on-premises and cloud integration, making it flexible for expansion based on industry needs where organizations have reported scalability issues and that continue to perform reliably as the user base and infrastructure grow.
How are customer service and support?
My experience with customer support for One Identity Active Roles has been generally positive, as the support team is technically strong and responsive in handling issues in most cases, and they provide clear guidance and effective solutions.
Which solution did I use previously and why did I switch?
Before implementing One Identity Active Roles, we were primarily using native Active Directory tools along with manual processes and some basic PowerShell scripts for user and group management, but we switched to One Identity Active Roles because those methods were time-consuming, error-prone, and lacked proper governance, delegation, and auditing capabilities, and as the organization grew, it became difficult to manage the identity life cycle efficiently, so we needed a centralized solution that could provide automation, role-based delegation, policy enforcement, and detailed auditing, which One Identity Active Roles delivered efficiently, helping us standardize processes, improve security, and reduce operational overhead.
How was the initial setup?
I would say the integration of One Identity Active Roles with our existing IT infrastructure and directory services was moderately easy, as it integrates quite well with Active Directory out of the box and aligns with the standard Microsoft environment, so the initial setup and synchronization were straightforward, but some complexity came in when configuring advanced workflows, custom policies, and integration with the hybrid environment like Azure AD, which required careful planning, scripting, and testing, so overall, it was manageable with good documentation and experience, but not completely plug-and-play for more advanced use cases.
What was our ROI?
We have definitely seen a strong return on investment after implementing One Identity Active Roles, mainly in terms of time saving, reduced workload, and improved efficiency, where user provisioning and access requests that earlier took hours are now completed in a few minutes through automation, and we observe around a 40 to 50% reduction in service desk tickets related to Active Directory tasks, which allows the team to focus on more critical activities instead of repetitive work, while delegation reduces dependency on senior administrators, indirectly saving manpower effort, and overall, the reduction in errors, faster onboarding, and improved compliance also contribute to cost savings and operational efficiency, making it a valuable investment for the organization.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing for One Identity Active Roles has been that it is on the higher side compared to native tools, as it follows an enterprise licensing model, typically based on the number of managed users or accounts, but the cost is justified by the value it delivers in terms of automation, security, compliance, and reduced operational overhead, while the initial setup cost includes infrastructure implementation and possible professional services, which require some planning and investment, and licensing management can be a bit complex depending on the organization's size and requirements, but overall, it is considered a worthwhile investment for large environments where efficiency, governance, and scalability are critical.
Which other solutions did I evaluate?
Before selecting One Identity Active Roles, we evaluated solutions such as Microsoft Identity Manager and SailPoint IdentityIQ , but we chose One Identity Active Roles because it provided a better balance of ease of deployment, strong Active Directory integration, effective delegation, and built-in automation, specifically tailored for our AD environment.
What other advice do I have?
My main use case for One Identity Active Roles is to centralize and streamline Active Directory administration by implementing secure delegation, automation, and governance control, where I primarily use it for automated user provisioning and de-provisioning based on HR triggers, applying role-based access control through access templates, enforcing naming and attribute policies, and managing group membership dynamically, along with configuring approval workflows for sensitive access requests to ensure compliance and audit readiness, while also reducing manual intervention for service desk teams when delegated limited administrative rights through One Identity Active Roles by giving direct access to the domain controller, thereby improving security and operational efficiency and consistency across the enterprise environment.
One specific issue I have encountered recently is that the interface and workflow configuration can become complex and less intuitive, especially when managing multiple approval steps or modifying existing workflows, which sometimes requires deeper scripting or backend adjustments, so more user-friendly and visual workflow design would be a great improvement, and as a wish-list item, I would like to see stronger, more seamless integration with cloud and hybrid environments like Azure AD, along with enhanced real-time reporting dashboards and easier troubleshooting tools, which would help in faster issue resolution and a better overall administration experience.
I would rate this product an 8 out of 10.
Automated workflows have transformed daily access control and now improve compliance
What is our primary use case?
One Identity Active Roles serves as the primary tool in our organization to streamline and secure Active Directory management by automating administrative tasks, enforcing governance policies, and reducing the risk of human error. It helps us delegate access control efficiently through role-based administration, ensuring that the right users have the appropriate permissions without granting excessive privilege. Additionally, it enhances compliance by providing detailed auditing, reporting, and approval workflows for changes made within the directory, which is especially important for maintaining security standards and regulatory requirements. Overall, it improves operational efficiency, strengthens our security posture, and simplifies identity and access management across the organization.
A practical example from our daily use of One Identity Active Roles is our automated user provisioning process, where it is configured with policies and workflows that trigger as soon as a new employee is added to our HR systems or Active Directory. The system automatically assigns the correct group membership, email access, and permissions based on their roles and department, while also enforcing naming conventions and security rules simultaneously. Privileged access requests, such as adding a user to admin groups, go through an approval workflow that requires managerial authorization and is fully logged for auditing. This approach not only saves significant manual effort for the IT team but also ensures strict governance, consistency, and compliance without relying on individual administrators to remember every policy.
Our main day-to-day use of One Identity Active Roles revolves around simplifying and controlling Active Directory operations through delegated administration and policy-based management. We allow helpdesks or junior IT staff to handle routine tasks such as user creation, password resets, and group modifications without giving them full domain access, ensuring security is never compromised. Simultaneously, we rely heavily on its built-in workflows and approval mechanisms for sensitive changes, such as privilege escalation or access to critical systems, which ensures every action follows a defined governance process and is properly audited. Its automation capabilities help maintain consistency in user attributes, enforce compliance policies, and reduce manual errors, making it an essential tool that keeps our identity management efficient, secure, and aligned with organizational standards on a daily basis.
The workflow automation and auditing features of One Identity Active Roles have made a clear impact in our daily work, especially in handling access requests and compliance tracking. When a user needs elevated privileges, the request automatically goes through a predefined approval workflow instead of relying on manual emails, ensuring proper authorization before any changes are made and every action is logged with full details. This becomes extremely useful during audits or troubleshooting because we can quickly track who made what changes and when, reducing investigation time and improving accountability. This approach also removes the dependency on manual follow-ups and minimizes the risk of unauthorized access.
What is most valuable?
One of the best features of One Identity Active Roles is its strong combination of automation, security, and centralized control, which makes Active Directory management much more efficient and governed. A standout feature is workflow automation, where repetitive tasks such as user provisioning, deprovisioning, and access changes are handled automatically based on predefined rules, saving time and reducing manual errors significantly. Another key feature is role-based delegation, which allows organizations to grant limited control access to helpdesks or junior staff without exposing critical admin privileges, ensuring a least privilege security model. One Identity Active Roles also offers policy-based management where rules enforce naming conventions, mandatory attributes, and compliance standards during any Active Directory changes, maintaining consistency across the environment. Additionally, features such as dynamic groups, memberships, and temporal access automatically add or remove users from groups based on coordination or time, which is very useful for managing temporary or role-based access. Finally, its auditing and reporting capabilities provide full visibility into who made what changes and when, helping with compliance, troubleshooting, and security monitoring. Overall, these features together make One Identity Active Roles a powerful tool for improving efficiency, strengthening governance, and securely managing identity and access management operations.
What needs improvement?
One area where One Identity Active Roles can be improved is in simplifying its initial setup and configuration process, as deployment can be complex and time-consuming for a new user or organization without deep Active Directory expertise, which can slow down adoption and require additional training or support. Additionally, improving the user interface to make it more intuitive and user-friendly would enhance the overall experience for administration, especially for those who are not highly technical. There is also scope to enhance performance in certain scenarios such as reporting over slower networks. Expanding flexibility in customization and integrations could further strengthen its usability in modern hybrid and cloud environments, making it even more efficient and easier to manage at scale.
One improvement I would particularly highlight for One Identity Active Roles is the need for seamless integration with modern cloud platforms and hybrid environments. Many organizations now operate beyond traditional on-premises Active Directory, and having more out-of-the-box connection connectors and easier configuration for tools such as Azure or other SaaS applications would save time and effort. Making reporting and dashboards more customizable and intuitive would help administration quickly derive insights without relying on external tools. Improving documentation and in-product guidance could also make troubleshooting and advanced configuration much easier, especially for new users who are still becoming familiar with the platform.
For how long have I used the solution?
I have been using One Identity Active Roles for the last two years.
What do I think about the stability of the solution?
One Identity Active Roles is generally considered a stable and reliable solution in most enterprise environments, as many users rate its stability quite high, often between seven to ten out of ten. They highlight that it performs consistently well for automation, delegation, and auditing tasks.
What do I think about the scalability of the solution?
One Identity Active Roles is highly scalable and can easily support large enterprise environments with thousands to even hundreds of thousands of users across multiple domains. It grows well with our organization's needs without major performance issues, making it suitable for both mid-sized and large companies.
How are customer service and support?
Customer support for One Identity Active Roles is generally good, as most users report that the support team is responsive, technically knowledgeable, and ready to assist whenever tickets are raised, often providing clear and practical solutions to issues. Although in some cases there are slight delays or slower responses for more complex problems, the overall support experience is positive and reliable, though there is room for improvement in response time for critical or advanced issues.
Which solution did I use previously and why did I switch?
Before adopting One Identity Active Roles, we were primarily relying on native Microsoft Active Directory tools and manual PowerShell scripts for user and access management. We switched because those methods lacked centralized governance, automation, and proper auditing capabilities, which made the process time-consuming and prone to errors. As our environment grew, managing permissions and ensuring compliance became increasingly complex, so moving to One Identity Active Roles helped us streamline operations with automation, enforce consistent policies, and gain better visibility and control over all directory-related activities.
How was the initial setup?
Integrating One Identity Active Roles with our existing IT infrastructure and Active Directory is moderately straightforward but not entirely simple. It fits well within our traditional Active Directory environment and connects effectively with directory services. However, the initial setup, configuration of policies, and aligning it with existing workflows require careful planning and some expertise, especially when customizing roles and permissions. While basic integration is smooth, more advanced setups such as hybrid environments or additional system integrations can add complexity. Overall, it is manageable but does require a certain level of technical understanding to fully optimize its capabilities.
What was our ROI?
We have seen a clear return on investment with One Identity Active Roles, as it has reduced manual administration effort by approximately fifty to sixty percent, which directly translates into time savings for the IT team. In some cases, tasks that earlier took fifteen to twenty minutes, such as user provisioning or access changes, are now completed in just a few minutes through automation, while also reducing errors significantly, which avoids network and potential security risks. Overall, it has allowed us to handle the same workload with fewer resources or relocate team members to more strategic tasks, ultimately improving our productivity and delivering strong value compared to the investment made.
What's my experience with pricing, setup cost, and licensing?
Our experience with pricing, setup cost, and licensing for One Identity Active Roles has been generally positive, though with a few considerations as the solution follows a subscription-based licensing model, typically calculated based on the number of managed users and required features, which makes it scalable but can become relatively expensive for larger organizations and environments. The initial setup and procurement process was smooth with good vendor support, but the overall cost is on the higher side compared to basic tools, though it is justified by the value it delivers in automation, governance, and time savings. In our case, we found that the return on investment was strong because it significantly reduced manual efforts and administrative workload, making the pricing work despite the higher upfront and licensing costs.
Which other solutions did I evaluate?
Before selecting One Identity Active Roles, we evaluated a few other identity and Active Directory management solutions such as Microsoft Entra ID , Okta, and ManageEngine ADManager Plus , as they are commonly considered strong alternatives in the identity and access management space with capabilities such as automation, access control, and governance. While each had its strengths, especially in cloud integration or ease of use, we ultimately chose One Identity Active Roles because it offered more granular control, deeper Active Directory management, and stronger policy-based governance tailored to our on-premises and hybrid environment needs.
What other advice do I have?
My advice for anyone considering One Identity Active Roles would be to invest time in proper planning and initial setup, especially around role design, delegation models, and policy configuration, because the real value of the tool comes from how well these are structured from the beginning. Also, ensure your team has a good understanding of Active Directory. I would rate this product a nine out of ten overall.
Automation has transformed user lifecycle tasks and delegation now improves daily security control
What is our primary use case?
I have been working in the cybersecurity field for about one year using One Identity Active Roles .
One Identity Active Roles is used for Active Directory management and user lifecycle management, including tasks such as user provisioning, group management, and enforcing access policies in a controlled and automated way.
When a new employee joins, I use One Identity Active Roles to create the user account with predefined templates and automatically assign the required groups and permissions, ensuring consistency and saving time. Similarly, when someone leaves, I can quickly disable the account and remove access.
Password resets and access requests represent another scenario related to our main use case, where Active Directory allows us to delegate tasks securely to help desk teams without giving full admin rights, reducing the workload on admins and ensuring proper control and auditing.
How has it helped my organization?
One Identity Active Roles has improved our daily operations by simplifying user management and reducing manual work, as tasks like user creation, password resets, and access changes are faster and more consistent while also improving security by controlling permissions and keeping proper audit logs. Overall, it saves time and makes administration more efficient.
We saw around forty to fifty percent time savings in routine tasks like user creation and password resets, while the help desk workload also reduced since tasks are delegated properly, and errors in access management decreased, improving overall security and consistency.
What is most valuable?
The best features of One Identity Active Roles, in my opinion, are automated user lifecycle management, rule-based access control, and delegation, which allows us to automate the creation and modification of user roles, saving a lot of time while providing fine-grained access control with least privilege, thereby improving security.
The features are very helpful in daily work, especially with delegation, where we can give limited access to the help desk team to handle tasks like password resets or unlocking accounts without giving full admin rights, improving security and reducing the workload on senior admins.
One more useful feature of One Identity Active Roles is auditing and reporting, which tracks all changes made to user accounts and access, being very helpful for troubleshooting and compliance. Many people do not realize how useful this is for maintaining security and accountability.
What needs improvement?
One Identity Active Roles is very helpful, but a few improvements could make it even better, such as simplifying the user interface to make it more user-friendly, especially for new users, and making setup and configuration easier. Adding more customization in reporting and improving performance for larger environments would further enhance the experience. Overall, it is a strong tool with minor areas for improvement.
Navigation between different options can feel complex, so simplifying that would help. Additionally, quicker search and better filtering options for users and groups would make daily tasks even faster, enhancing usability.
For how long have I used the solution?
I have been working in my current field for three years.
What do I think about the stability of the solution?
One Identity Active Roles is generally stable and reliable, with most users rating its stability quite high, often between a seven to ten out of ten, consistently performing for daily operations like automation and user management without major downtime reported.
What do I think about the scalability of the solution?
One Identity Active Roles is highly scalable, capable of handling large environments with thousands or even hundreds of thousands of users across multiple domains without major issues and continuing to perform well and manage user groups and policies efficiently as the environment grows.
How are customer service and support?
The customer support is good, with the team being knowledgeable and helpful, usually assisting well with issues, although response times can sometimes vary depending on the complexity.
I would rate the customer support a nine out of ten.
Which solution did I use previously and why did I switch?
We were not using any dedicated solution before One Identity Active Roles, as most tasks were handled manually in Active Directory, and we switched to reduce manual efforts, improve security, and make user management more efficient.
How was the initial setup?
The integration of One Identity Active Roles with our existing IT infrastructure and directory services was relatively easy since it works closely with Active Directory, where the basic setup was straightforward; however, some configuration and fine-tuning took time. Once integrated, it works smoothly with our existing infrastructure.
What was our ROI?
We have seen a good return on investment, as routine tasks like user creation and password resets became faster, saving around forty to fifty percent of the time; delegation also reduced the workload on admins, allowing the team to focus on more important tasks, improving efficiency and reducing operational efforts.
What's my experience with pricing, setup cost, and licensing?
Our experience with pricing, setup cost, and licensing has been reasonable; the initial setup took some effort, especially during configuration, but it was manageable, with licensing being flexible based on the number of users and the environment, making it scalable and providing good value considering the features and time savings.
Which other solutions did I evaluate?
We did not formally evaluate other tools before choosing One Identity Active Roles, selecting it based on our requirement for better Active Directory management, automation, and security.
What other advice do I have?
One Identity Active Roles has significantly reduced the complexity and workload of administrative tasks related to Active Directory, as routine tasks like user creation, password resets, and access changes are automated or delegated, saving time and reducing manual efforts while making management more structured and consistent, making overall administration easier and more efficient.
My experience with the delegation of administrative tasks through One Identity Active Roles has been very good, allowing us to assign specific tasks like password resets, account unlocks, and basic user management to the help desk team without giving them full admin rights, which has improved our workflow by reducing the workload on admins and speeding up issue resolution while also improving security and accountability since access is controlled and all actions are properly logged.
My advice for others looking into using One Identity Active Roles would be to clearly understand your Active Directory structure and requirements before implementation, plan roles and permissions properly, and make good use of the automation and delegation features to reduce manual work and improve security.
Overall, One Identity Active Roles is a reliable tool that simplifies user management and improves security, saving time and making daily operations more efficient. I would rate this product eight out of ten.
Automation has transformed onboarding and now simplifies secure access delegation every day
What is our primary use case?
My main use case for One Identity Active Roles is to simplify and automate Active Directory management. I use it for user provisioning, group management, and to handle access requests more effectively. It helps reduce manual effort and ensures consistency in user account changes.
One Identity Active Roles automates access requests through a predefined workflow. For example, when a new employee joins, their manager can request access via a simple form. The system automatically assigns the required groups based on their role and approvals are handled within the workflow, so no manual intervention is needed from the IT team.
The delegation feature lets us assign specific admin tasks to different teams without giving full domain access. This maintains security while still allowing teams to manage their own users. It also gives us better visibility through auditing and reporting.
How has it helped my organization?
I have seen clear, measurable improvements after implementing One Identity Active Roles. User onboarding time has reduced from around 30 minutes to just five to 10 minutes with automated workflows. That alone has saved our IT team several hours each week, especially during bulk hiring periods. I have also noticed a significant drop in errors related to incorrect group assignments and missed access, since everything now follows predefined policies. Earlier, these issues were very common with manual changes, but now they are very rare.
What is most valuable?
The best features of One Identity Active Roles are its automation, delegation, and strong control over Active Directory. The workflow automation is especially useful. It helps handle user provisioning, approvals, and changes without manual effort. It also offers role-based delegation so you can give limited access to teams without exposing full admin rights, which improves security.
Policy-based automation stands out because it ensures all changes follow predefined rules, so there is consistency across users and groups without manual checks. Features like dynamic groups and temporal access make it easier to manage users automatically based on roles or time-based needs.
One Identity Active Roles has had a very positive impact on our organization, mainly by improving efficiency and security at the same time. Tasks such as user provisioning, access changes, and password resets are now automated, which has significantly reduced manual workload and saved a lot of time for our IT team. Automation can cut manual effort by a large margin and speed up routine operations considerably.
The automation capabilities of One Identity Active Roles are one of its strongest points. It significantly reduces manual effort by handling routine tasks through workflows and policies. For example, when a new user is created, the system can automatically assign group memberships, set attributes, and apply naming conventions based on predefined rules. Similarly, for role changes, it updates access rights without needing manual intervention. Overall, it saves time, reduces errors, and ensures consistency across the environment.
One Identity Active Roles has significantly reduced both complexity and workload for our Active Directory administration. Tasks that used multiple manual steps, such as user creation, access changes, and group management, are now handled through automatic workflows. It also simplifies operations by providing a centralized console, so admins do not have to jump between different tools or scripts. It makes day-to-day management much more straightforward and less time-consuming.
What needs improvement?
One area where One Identity Active Roles can be improved is in the user interface. It can feel outdated and not very intuitive for new users. Some tasks require multiple steps or navigation through different sections, which can slow things down initially. A more modern and simplified UI would definitely improve the overall experience.
Another area for improvement is around integration and flexibility. While it works well with the core Microsoft environment, expanding smoother integration with more third-party tools and cloud platforms would make it even more versatile. This would help organizations manage hybrid environments more seamlessly. Overall, One Identity Active Roles is already a strong product, but small enhancements in integration and scalability would be beneficial.
For how long have I used the solution?
I have been using One Identity Active Roles for three years.
What do I think about the stability of the solution?
One Identity Active Roles is stable.
What do I think about the scalability of the solution?
One Identity Active Roles is generally considered highly scalable, especially for mid to large enterprise environments. From our experience and industry feedback, it handles growth quite well as the number of users, groups, and domains increase. The platform can scale without needing a complete redesign. For example, it can support larger user bases, even 100,000+ users in some cases, and still maintain performance with proper infrastructure planning.
How are customer service and support?
Customer support is very good and responsive.
Which solution did I use previously and why did I switch?
Earlier we were using native Active Directory tools and some PowerShell scripts for user and access management. While that worked, it was quite manual, time-consuming, and prone to inconsistency, especially as the environment grew. I switched to One Identity Active Roles to bring in automation, better delegation, and centralized control. Overall, the move helped us to standardize the process and scale more effectively as our user base increased.
How was the initial setup?
Overall, the integration was fairly smooth and straightforward, especially since our environment is already based on Active Directory. One Identity Active Roles fits naturally into AD, so the initial setup and synchronization did not require major changes to our existing infrastructure.
What was our ROI?
I have definitely seen a strong return on investment after implementing One Identity Active Roles. One clear example is in user onboarding, where what earlier took around 20 to 30 minutes per user now takes only five to seven minutes, which has saved us several hours of IT effort. Also, we have reduced dependency on senior admins since many tasks are now delegated or automated, so fewer escalations are needed. Overall, the time saving, improvement in efficiency, and reduced manual effort have made the investment worthwhile.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing and licensing has been generally positive, though it does not feel like a premium product. The licensing model is straightforward, and once understood, typically based on the number of managed users, which makes it predictable as the organization grows. Overall, while the cost may be on the higher side compared to basic tools, the value it delivers in terms of automation, efficiency, and security makes it a worthwhile investment.
Which other solutions did I evaluate?
Before choosing One Identity Active Roles, I evaluated a few other options. I looked at Microsoft's native tools and Azure Entra ID, as well as some third-party solutions such as ManageEngine ADPlus Manager. I chose One Identity Active Roles because it offered a better balance of automation, policy-based management, and fine-grained delegation, which suited our environment more effectively.
What other advice do I have?
I advise others looking into using One Identity Active Roles to plan out your workflows and policies carefully before implementation. One Identity Active Roles is very powerful, but you will get the most value if your processes are clearly defined from the start. Also, start with a phased approach. Begin with key use cases such as provisioning and delegation, then gradually expand to more advanced automation. This makes adoption smoother and avoids overwhelming the team. Finally, invest some time in training and documentation so your team can fully utilize the features instead of just using it as a basic AD tool. I would rate this product a 9 out of 10.