Type your search criteria

explore zorp
the number one multi-purpose proxy gateway
use case

active roles

Hybrid Active Directory management, simple and secure
In today’s hybrid AD environments and with the limited capabilities of Microsoft Active Directory (AD) and Azure Active Directory (AAD) native tools, administrators struggle to keep up with requests to create, change or remove access. Thankfully, help has arrived.

With One Identity Active Roles, you can streamline user and group administration, solve security issues and meet those never-ending compliance requirements by managing and securing on-premises and cloud AD resources simply and efficiently with a single, intuitive solution.

Why do you need api securiy?

use case


contact sales
granular protocol control
Full interpretation and validaton of 20+ network protocols
Connection handling on application layer
Control of protocol channels ( e.g. file transfer, port forward)
comprehensive encryption support
control of SSL / TLS-encrypted protocols
TLS 1.3 cryptography support
use case

use cases

contact sales
API breach prevention

Unauthorized user or bot access, data leaks, (D)DOS attacks, misuses and human errors have become real threats for companies operating API infrastructures. Protecting your organization from API breaches is the ultimate goal of the Zorp API Gateway. You can authenticate API-requestors, control API calls and inspect the traffic in detail. By encrypting the traffic, you can increase the security of the API communication further. Enforce a custom API security policy without affecting the business operations.

traffic analysis

Zorp API Gateway supports detailed and flexible logging. You can extract customized data from the API-traffic, those you can analyze from different perspectives. You can forward security relevant logs to the SIEM or SOC to improve your API security monitoring posture. The Zorp API Gateway also supports big data tools and data lakes (for example, Kibana, Elasticsearch or Kafka) as potential log destinations. You can send pre-filtered, quality data to these destinations for in-depth business analysis.

Regulatory compliance

PSD2 requires banks to secure the financial data flow via their public-facing APIs. GDPR indirectly requires anonymization or pseudo anonymization of personal data in transit.  The PCI DSS requires financial providers to encrypt transmission of cardholder data via public networks… All these regulations have one key requirement in common: they require regulated companies to protect customers’ data at rest and in transit, as well. The Zorp API Gateway helps streamline your compliance efforts through its comprehensive access control, encryption and audit capabilities.

Protecting legacy systems

The Zorp API Gateway can ensure compatibility with your legacy systems by modifying certain elements of the API traffic. This enables the possibility of hiding information about security risks and treating the vulnerabilities of your legacy applications. For example, you can remove the error messages, banners, or other information specific to the applications to hide faulty configuration or sensitive information about your back-end infrastructure. It can even force upgrade of legacy encryption protocols to the recent TLS version.

Special network security projects

Thanks to its extremely flexible, scriptable configuration you can meet specific security requirements with Zorp Gateway. Just a few examples:

• Data manipulation - modifying sensitive or risky elements of the traffic. For example, masking credit card data or hiding vulnerable server configuration.
• Graceful degradation of services during peak times by preferring transaction-closing events
• Implement your own protocol by using the AnyPy proxy and the power of Python

use case


Automatic user lifecycle management
Active Roles automates a wide variety of tasks, including:
Creating, removing, or modifying user and group accounts in AD and AAD
Administering groups across AD and AAD
Creating mailboxes in Exchange and Exchange Online
Assigning resource in Windows
Day-to-day directory management
Active Roles easily manages:
Active Directory and Azure Active Directory
Exchange/Exchange Online recipients, including mailbox/OCS assignment, creation, movement, deletion, permissions and distribution list management
Computers, shares, printers, local users and groups
User and group management in hosted environment
Synchronize AD domain clients with a host AD domain in hosted environments. Utilize out-of-the-box connectors to synchronize your on-premises AD accounts to Microsoft Office 365, Lync Online and SharePoint Online.
Identity analytics
Mitigate risks before an issue occurs through comprehensive insight into user entitlements in a hybrid AD environment with Starling Identity Analytics & Risk Intelligence. 
Secure AD/AAD access
Active Roles provides comprehensive privileged access management for Active Directory and Azure Active Directory: 
Access control and delegation based on a least-privilege model 
Access rules enforcement
Robust and personalized approval procedure
One Identity Hybrid Subscription
Expand the capabilities of Active Roles with the One Identity Hybrid Subscription and get immediate access to cloud-delivered services, including two-factor authentication to protect administrative access, entitlement and Active Roles access analysis.
Integration with enterprise IAM programs
Active Roles complements your existing technology and IAM strategy through easy integration with many One Identity products, including Identity Manager, Safeguard for Privileged Passwords, Privileged Access Suite for Unix, Cloud Access Manager and Quest ChangeAuditor. Active Roles also automates and extends the capabilities of PowerShell, ADSI, SPML and customizable web interfaces.


See Active Roles Benefits:

Protects critical Active Directory and Azure Active Directory data

Regulates administrative access via a least-privilege model

Automates users/group account creation and deletion

Manages identities for Exchange Online, Lync, SharePoint Online and Office 365 and many more

Overcomes native AD-tools limitations with automatic, consistent, and complete management 

Provides a single, intuitive tool for hybrid AD environment

Generates audit-ready reports

Know who made what change and when

Deploys quickly for rapid time-to-value

Modular architecture to meet today and tomorrow’s business needs

use case

iot security

IoT elements are exposed to be attacked permanently, so they need
solid security tools which can cut risks back to as little as possible.
In a world where everything joins networks, even networks too, you
need a tool to make these increased connections organized.
Button Text