Loading...
AD, Entra ID, Exchange & M365 management with automation & delegation

Adaxes is a standalone software solution that acts as a proxy between users and Active Directory, Microsoft Entra ID, Exchange, and Microsoft 365. The product enables centralized management of both on-premises and cloud environments without modifying native directory structures or extending schemas. The solution provides automation rules, approval-based workflows, and role-based permissions for directory operations. It supports cross-domain management across multiple Active Directory domains and Microsoft Entra ID tenants, including environments without trust relationships. Operations are executed through service accounts, allowing centralized delegation of rights across unrelated domains. Adaxes includes load balancing and fault tolerance capabilities through multiple service instances that share common configuration. The web interface can be deployed behind a load balancer for distributed access. The product supports extensibility through custom scripts and multiple APIs for third-party integrations. Security features include encrypted communications between all components, with LDAPS or Kerberos encryption for Active Directory connections. The web interface can be deployed in a DMZ for public access with SSL support and includes brute force protection mechanisms. All security-sensitive data is encrypted with 1024-bit RSA when SSL is not enabled. The solution does not store data in Active Directory or Microsoft Entra ID and does not modify native permissions or directory schemas.
Common questions about Adaxes including features, pricing, alternatives, and user reviews.
Adaxes is AD, Entra ID, Exchange & M365 management with automation & delegation developed by softerra adaxes. It is a IAM solution designed to help security teams with Active Directory, RBAC, Microsoft 365.
Identity lifecycle mgmt solution for workforce provisioning & access control
Automated user provisioning and self-service IT catalog for identity mgmt.
Get strategic cybersecurity insights in your inbox