Posted on
Microsoft SaaS

Editor’s note: This publish is a in a number of posts about identity management. Browse the others below!

AvePoint may be the Microsoft Cloud Expert. What this means is we work with Microsoft to make sure and optimize cloud solutions for Azure-based customers.

Being an Independent Software Vendor, both of us offer collaboration and application experts in addition to our very own solution set to assist companies maximize their cloud investments.

Every customer has their own culture regarding collaboration and Microsoft products, but there are several unifying styles we have seen in cloud services an internet-based application investment that will assist you as well as your teams manage both finish users better and make preparations better for costs to the process of supporting use of online applications.  


Make sure to take a look at our approaching web seminar, “Government Departments &amp Compliant Migration: Relocating To O365 &amp Hybrid Environments,” May 29 at 11:00 am EST


A. Every seat counts Microsoft and AvePoint both use user-based license models to charge companies for use of cloud services in Azure.

As a result, monitoring active licensed accounts becomes an essential part from the process. Even when a company is within hybrid cloud mode, Active Directory may be the primary place for identity and user management.  

SaaS Microsoft Identity Management

B. Reviewing seat counts- Keeping a good tab and building sustainable and repeatable processes and alerts around who is definitely an worker, who’s going to get an worker, and who’s departing or who’s temporarily an worker might help reduce price of online applications.  

  • This really is something that isn’t just an IT burden. HR, Legal, Finance, and Security teams will also be essential partners in worker management. Creating regular channels, reports, and alerts around worker changes, and tasking/charging teams with this particular function is a vital initial step in effectively securing your applications and content, and also ensuring the swimming pool of makes up about me is stored accurate.  

C. Instituting “Need to Know” rules for Software like a Service (SaaS) – perhaps “Need to have application x?”  

I. From the authorities services talking to world, use of government systems or government owned applications which could contain sensitive or classified information is dependant on an easy principle: have to know. Performs this person, in order to do their job, have to know these details?  

SaaS Microsoft Identity Management

II. For Cloud based applications, possibly a twist about this – must have? Will a user, in order to complete tasks as well as their daily work, must have use of this application? Nice to possess versus essential might help scope lower active license accounts whilst helping IT Services team sharpen on practicing applications necessary for business.  

III. This could also tie into access lifecycle – how lengthy will a user need use of a method? Establishing regular audit for access activity in addition to regular quarterly or sooner reviews might help IT admins stay on the top of regularly used and unused applications the company is having to pay for.  

D. Follow-up incumbent on there services for must have- schedules, reminders, and scripting audit/reports for normal task-based overview of current condition of applications.  

  • Have a visual map from it service-based applications. It will help show where there might be overlap or relations between IT enabled applications within the cloud. It may also show potential convergence between management systems, and also provide gap analysis for user interest in specific applications.  

E. Solutions for automation and identity management  

I. Building out forms, not only email demands, for users to inquire about use of systems.  

II. Area of the pleasure and anxiety about O365 services associated with identity management is permissions. Permissions isn’t just an IT related task or burden. The company must be advised of the role and responsibility here.  

III. Training on permissions management and also the “Need to Know” Principle for application and access management might help mitigate security risks and application sprawl.  


Like that which you read? Make sure to sign up for our blog to remain in the fold for those things Office 365, SharePoint and much more!