• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
 by

Reviews

in
0.0
0 Reviews
Related markets: in System for Cross-Domain Identity Management (SCIM) (1 Review), in User Authentication (678 Reviews), in Identity Governance and Administration (100 Reviews)
OverviewReviewsLikes and Dislikes
FREE
View and Download Peer Insights About
User Sentiment
What Your Peers Are Saying About
Security Analyst
Company just got the M365E5 license. Trying to figure out the intune automatic enrollment part. All devices are Entra joined, most are by one of three people. Question is prior to setting up automatic enrollment would the owner of the computer need to be changed to the user with the E5 license assigned to them?
Data Scientist
As I understand it, the E5 is assigned to a user, the device working from can be any computer, as long as the policies allow the user to login to the device and the device is allowed to connect. So I would say no, the owner of the computer is only a matter if you are working on the computer and not in the M365 cloud.
See Full Discussion
20 Feb 2025877 Views1 Comment
Information Security Manager
For context, I am a one person security team as a ISM. Other IT departments are Network, Systems, and Customer service that are under a completely different direction. There has a small about of push-back when I speak on access management roles/responsibilities and separation of duties. What are some opinions on what is the best take on access management ownership with AD and Entra ID, and other services?
IT Analyst
If you are having resistance about it, I think the first step is to engage higher organization levels showing evolved risks. If you get green sign of them next steps are: 1) training teams about security and risks; 2) review organization's security policy;   2.1) maybe create a standard about IAM's administration; 3) implement IAM policy There is no formula about which team should do what, each organizations has its own way of working. It isn't a question of organizational chart, it's a question of resposibility. The most important thing is to ensure teams are aware of the their roles in the security implications.
See Full Discussion
11 Feb 2025703 Views1 Comment
Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.
This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply.
  • Community Guidelines
  • Listing Guidelines
  • Browse Vendors
  • Rules of Engagement
  • FAQ
  • Privacy
  • Terms of Service
©
 
©