Hitachi ID Identity and Access Management Suite uses the directory client built into the Windows server OS to manage passwords both on individual Windows servers, Active Directory domains and AD forests.
Hitachi ID Identity and Access Management Suite can integrate with multiple domains, in multiple forests at the same time. Trust relationships are not required to do this.
Where Hitachi ID Password Manager is used to clear intruder lockouts, it can automatically choose appropriate domain controller(s) on which to do so, so as to expedite propagation.
No agent software is installed locally on Windows servers or domain controllers, to manage users or passwords on Windows or Active Directory.
A DLL can be installed on Windows servers and/or AD domain controllers to intercept native password changes, subject them to an extra password policy and trigger password synchronization.
Hitachi ID Identity Manager can also manage objects outside of AD that pertain to AD users -- such as home directory shares and folders, mailboxes on Exchange or other e-mail systems, etc.
Hitachi ID Identity and Access Management Suite connectors can create, delete, enable, disable, modify, rename and move users on Windows 2000/2003/2008/2012 servers and Active Directory domains and forests. It creates new Windows users by cloning existing ones, copying and adjusting hundreds of native Windows, Active Directory and Exchange attributes in the process. It can also manage the membership of users in Windows and Active Directory groups.
When managing Windows/AD users, Hitachi ID Identity and Access Management Suite connectors can also create,
update and move Exchange mailboxes; create, populate and set access
rights on Windows home directories and more. In other words, it can
manage the entire Windows-platform user profile, rather than just AD