<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.1cloudconsultants.com/blogs/tag/zoho-directory/feed" rel="self" type="application/rss+xml"/><title>1cloudconsultants.com - News #Zoho Directory</title><description>1cloudconsultants.com - News #Zoho Directory</description><link>https://www.1cloudconsultants.com/blogs/tag/zoho-directory</link><lastBuildDate>Mon, 13 Apr 2026 17:40:27 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Zoho Directory 2.0 Arrives with Cloud RADIUS and Smart Groups]]></title><link>https://www.1cloudconsultants.com/blogs/post/zoho-directory-2.0-arrives-with-cloud-radius-and-smart-groups</link><description><![CDATA[<img align="left" hspace="5" src="https://www.1cloudconsultants.com/Zoho-Logos/Zoho-Directory-Logo.png"/>Zoho Directory 2.0 is the comprehensive identity platform for 2025. New features include Cloud RADIUS, Smart Groups, Conditional Access Policies, and BYOK encryption. Streamline user management and fortify security with this vital upgrade.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ZypAtgDRQCGOyXVE84E4aQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ApnsdM0gRw2C8s_Ie_W5Ag" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_sF5OAvsTRye_v-vpSFwVFg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_wmtcE0rkTRe2KtmbXmNKbQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><div><div class="zw-page" style="display:block;"><div class="selectableSection zw-contentpane"><p style="line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;border-bottom:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;">1 Cloud Consultants is proud to announce the immediate availability of <a href="/zoho-directory" title="Zoho Directory" rel="">Zoho Directory</a> 2.0, an evolution in identity and access management that sets a new standard for enterprise security and IT efficiency.</span></p><p style="line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;border-top:0px;border-bottom:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;">As a dedicated&nbsp;</span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;"><a href="/zoho-partner" title="Zoho Partner" rel="">Zoho Partner</a></span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;">, we are excited to deliver this comprehensive, all-in-one identity platform designed to address the challenges of the modern, distributed workforce. Zoho Directory 2.0 empowers IT administrators with a suite of features for &quot;effortless user management, robust network authentication, and stronger security controls.&quot;</span></p><h2 style="line-height:1.2;text-align:left;margin-bottom:0px;margin-left:0px;padding-bottom:10.6667px;margin-top:0px;border-top:0px;padding-top:0px;border-bottom:0px;"><span id="_Tocsbr4dz3kvwwv"></span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:18pt;font-weight:700;">Smarter Access, Stronger Security</span><span id="_Tocdlbkit9hqgg2"></span></h2><p style="margin:0px;line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;border-top:0px;padding-top:0px;border-bottom:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;">Zoho Directory 2.0 is not just an update - it's a comprehensive platform shift, focusing on enhancing security, automating critical management tasks, and simplifying directory services.</span></p><h2 style="line-height:1.2;text-align:left;margin-bottom:0px;margin-left:0px;padding-bottom:10.6667px;margin-top:0px;border-top:0px;padding-top:0px;border-bottom:0px;"><span id="_Tocxtmyn40b67pk"></span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:18pt;font-weight:700;">Core Features That Drive Efficiency and Control</span><span id="_Tocqbd8sr62qryh"></span></h2><p style="margin:0px 0px 16px;line-height:1.2;text-align:left;direction:ltr;padding-bottom:0px;border-top:0px;padding-top:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;">The 2.0 release introduces game-changing capabilities built to simplify administration and reduce security risks:</span></p><ul class="lst-85153169--1" style="list-style:disc;font-size:12pt;font-family:Arimo;letter-spacing:0px;color:rgb(0, 0, 0);padding:0px 0px 16px;margin:0px;border-bottom:0px;"><li style="line-height:1.2;text-align:left;margin-bottom:0px;margin-left:33.6719px;direction:ltr;font-size:12pt;padding-bottom:16px;margin-top:0px;padding-top:0px;padding-left:14.3281px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;padding-left:0px;">Cloud RADIUS:</span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;"> Say goodbye to complex, on-premise authentication servers and password sharing for Wi-Fi. Cloud RADIUS provides a simplified, secure method for setting up enterprise Wi-Fi authentication across multiple locations.</span></li><li style="line-height:1.2;text-align:left;margin-bottom:0px;margin-left:33.6719px;direction:ltr;font-size:12pt;padding-bottom:16px;margin-top:0px;border-top:0px;padding-top:0px;padding-left:14.3281px;border-bottom:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;padding-left:0px;">Smart Groups:</span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;"> Automate user and access management from day one. IT administrators can define rules based on attributes like role, department, or location. New employees are instantly and automatically assigned to the correct groups, eliminating manual onboarding steps.</span></li><li style="line-height:1.2;text-align:left;margin-bottom:0px;margin-left:33.6719px;direction:ltr;font-size:12pt;padding-bottom:16px;margin-top:0px;border-top:0px;padding-top:0px;padding-left:14.3281px;border-bottom:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;padding-left:0px;">Cloud LDAP:</span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;"> Modernise your directory services with a secure, cloud-based LDAP service. This feature simplifies user authentication and access control for various applications and infrastructure, bypassing the complexity of maintaining traditional on-premise servers.</span></li><li style="line-height:1.2;text-align:left;margin-bottom:16px;margin-left:33.6719px;direction:ltr;font-size:12pt;padding-bottom:0px;margin-top:0px;border-top:0px;padding-top:0px;padding-left:14.3281px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;padding-left:0px;">Note:</span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;"> Cloud LDAP is currently available across most data centres (DCs) but not in China (CN) or Canada (CA).</span></li></ul><div></div>
<h2 style="line-height:1.2;text-align:left;margin-bottom:0px;margin-left:0px;padding-bottom:10.6667px;margin-top:0px;padding-top:0px;border-bottom:0px;"><span id="_Toca2orb51nfv2g"></span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:18pt;font-weight:700;">Next-Generation Security and Compliance</span><span id="_Toc9eb2qo7636sr"></span></h2><p style="margin:0px;line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;border-top:0px;padding-top:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;">The platform’s significant security enhancements give IT teams the granular control and proactive threat detection needed in today's landscape.</span></p><table class="zw-table" style="width:6.396in;margin-left:0in;border-collapse:collapse;"><colgroup><col style="width:1.43in;"/><col style="width:4.97in;"/></colgroup><tbody class="zw-tbody" style="vertical-align:top;"><tr class="zw-tr"><td class="zw-td" style="vertical-align:middle;border-width:1px;border-style:solid;border-color:rgb(0, 0, 0);"><div class="zw-cell-container" style="min-height:0px;margin:0.96px;"><p style="margin:0px;line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;padding-top:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;">Security Feature</span></p></div></td><td class="zw-td" style="vertical-align:middle;border-width:1px;border-style:solid;border-color:rgb(0, 0, 0);"><div class="zw-cell-container" style="min-height:0px;margin:0.96px;"><p style="margin:0px;line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;padding-top:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;">Key Benefit for Administrators</span></p></div></td></tr><tr class="zw-tr"><td class="zw-td" style="vertical-align:middle;border-width:1px;border-style:solid;border-color:rgb(0, 0, 0);"><div class="zw-cell-container" style="min-height:0px;margin:0.96px;"><p style="margin:0px;line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;padding-top:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;">Conditional Access Policies</span></p></div></td><td class="zw-td" style="vertical-align:middle;border-width:1px;border-style:solid;border-color:rgb(0, 0, 0);"><div class="zw-cell-container" style="min-height:0px;margin:0.96px;"><p style="margin:0px;line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;padding-top:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;">Grant or block access, or prompt for MFA, based on factors like location, device, IP address, and login time.</span></p></div></td></tr><tr class="zw-tr"><td class="zw-td" style="vertical-align:middle;border-width:1px;border-style:solid;border-color:rgb(0, 0, 0);"><div class="zw-cell-container" style="min-height:0px;margin:0.96px;"><p style="margin:0px;line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;padding-top:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;">Anomaly Detection</span></p></div></td><td class="zw-td" style="vertical-align:middle;border-width:1px;border-style:solid;border-color:rgb(0, 0, 0);"><div class="zw-cell-container" style="min-height:0px;margin:0.96px;"><p style="margin:0px;line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;padding-top:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;">Proactively monitors and flags unusual or suspicious user behaviours, providing early warnings of potential security violations.</span></p></div></td></tr><tr class="zw-tr"><td class="zw-td" style="vertical-align:middle;border-width:1px;border-style:solid;border-color:rgb(0, 0, 0);"><div class="zw-cell-container" style="min-height:0px;margin:0.96px;"><p style="margin:0px;line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;padding-top:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;">BYOK (Bring Your Own Key)</span></p></div></td><td class="zw-td zp-selected-cell" style="vertical-align:middle;border-width:1px;border-style:solid;border-color:rgb(0, 0, 0);"><div class="zw-cell-container" style="min-height:0px;margin:0.96px;"><p style="margin:0px;line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;padding-top:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;">Provides organisations with ultimate control over data encryption by allowing them to import and manage their own encryption keys.</span></p></div></td></tr><tr class="zw-tr"><td class="zw-td" style="vertical-align:middle;border-width:1px;border-style:solid;border-color:rgb(0, 0, 0);"><div class="zw-cell-container" style="min-height:0px;margin:0.96px;"><p style="margin:0px;line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;padding-top:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;">Audit Logs</span></p></div></td><td class="zw-td" style="vertical-align:middle;border-width:1px;border-style:solid;border-color:rgb(0, 0, 0);"><div class="zw-cell-container" style="min-height:0px;margin:0.96px;"><p style="margin:0px;line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;padding-top:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;">Maintains detailed records of every critical administrator action, essential for meeting compliance standards and facilitating quick security incident response.</span></p></div></td></tr></tbody></table><p style="margin:0px;line-height:1.2;text-align:left;padding-bottom:16px;padding-top:0px;border-bottom:0px;"><br/></p><h2 style="line-height:1.2;text-align:left;margin-bottom:0px;margin-left:0px;padding-bottom:10.6667px;margin-top:0px;border-top:0px;padding-top:0px;border-bottom:0px;"><span id="_Tocd9h7m5z651jz"></span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:18pt;font-weight:700;">Flexible Authentication with Routing Policies</span><span id="_Toc7639r4x9eq2m"></span></h2><p style="margin:0px;line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;border-top:0px;padding-top:0px;border-bottom:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;">The new&nbsp;</span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;">Routing Policy</span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;"> feature adds flexibility to the sign-in experience. Administrators can now define the primary (first factor) authentication method, allowing employees to sign in using a traditional password, a social account, or a custom identity provider, all configurable based on team or organizational needs.</span></p><h2 style="line-height:1.2;text-align:left;margin-bottom:0px;margin-left:0px;padding-bottom:10.6667px;margin-top:0px;border-top:0px;padding-top:0px;border-bottom:0px;"><span id="_Tocd7e24ynld3h5"></span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:18pt;font-weight:700;">Why Choose Zoho Directory 2.0 with a Zoho Partner?</span><span id="_Tocv9ib1dmyqxwy"></span></h2><p style="margin:0px;line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;border-top:0px;padding-top:0px;border-bottom:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;">&quot;The shift to hybrid work demands an identity platform that is both powerful and simple to manage,&quot; says Sarah, Client Success Manager, 1 Cloud Consultants. &quot;As a&nbsp;</span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;">Zoho Partner</span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;">, we are uniquely positioned to help our clients migrate, implement, and optimise Zoho Directory 2.0 to ensure they maximise its security and automation capabilities from day one. This update is a game-changer for IT teams seeking stronger security and true efficiency.&quot;</span></p><p style="margin:0px;line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;border-top:0px;padding-top:0px;border-bottom:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;">Zoho Directory 2.0 delivers on the promise of smarter access and stronger security, making it the definitive platform for upgrading your organisation’s workforce identity management in 2025.</span></p><h2 style="line-height:1.2;text-align:left;margin-bottom:0px;margin-left:0px;padding-bottom:10.6667px;margin-top:0px;border-top:0px;padding-top:0px;border-bottom:0px;"><span id="_Tocfhv3w8892aiz"></span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:18pt;font-weight:700;">Ready to Upgrade Your Identity Management?</span><span id="_Tocxzr0ofj88v0c"></span></h2><p style="line-height:1.2;text-align:left;direction:ltr;padding-bottom:16px;border-top:0px;border-bottom:0px;"><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;font-weight:400;"><a href="/contact" title="Contact&nbsp;1 Cloud Consultants" rel="">Contact&nbsp;</a></span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;"><a href="/contact" title="Contact&nbsp;1 Cloud Consultants" rel="">1 Cloud Consultants</a></span><span style="font-family:Roboto;color:rgb(0, 0, 0);font-size:12pt;vertical-align:baseline;"> today for a personalised demonstration of Zoho Directory 2.0 and learn how we can seamlessly integrate these powerful new features into your existing infrastructure.</span></p></div><div class="zw-footer"><div></div>
</div></div><code><style id="code-style">#ui-editor-outer-div .t1 .kwd { color: rgb(102, 121, 204) }#ui-editor-outer-div .t1 .com { color: rgb(107, 115, 148) }#ui-editor-outer-div .t1 .str { color: rgb(172, 151, 57) }#ui-editor-outer-div .t1 .atv { color: rgb(34, 162, 201) }#ui-editor-outer-div .t1 .typ, #ui-editor-outer-div .t1 .fun { color: rgb(61, 143, 209) }#ui-editor-outer-div .t1 .tag, #ui-editor-outer-div .t1 .var { color: rgb(201, 73, 34) }#ui-editor-outer-div .t1 .lit, #ui-editor-outer-div .t1 .atn, #ui-editor-outer-div .t1 .dec { color: rgb(199, 107, 41) }#ui-editor-outer-div .t1 .pln, #ui-editor-outer-div .t1 .pun, #ui-editor-outer-div .t1 .opn, #ui-editor-outer-div .t1 .clo { color: rgb(245, 247, 255) }#ui-editor-outer-div .t2 .kwd { color: rgb(167, 29, 93) }#ui-editor-outer-div .t2 .com { color: rgb(150, 152, 150) }#ui-editor-outer-div .t2 .str { color: rgb(24, 54, 145) }#ui-editor-outer-div .t2 .atv { color: rgb(24, 54, 145) }#ui-editor-outer-div .t2 .typ { color: rgb(0, 134, 179) }#ui-editor-outer-div .t2 .fun { color: rgb(153, 0, 0) }#ui-editor-outer-div .t2 .tag { color: navy }#ui-editor-outer-div .t2 .var { color: teal }#ui-editor-outer-div .t2 .lit { color: rgb(0, 134, 179) }#ui-editor-outer-div .t2 .atn { color: rgb(121, 93, 163) }#ui-editor-outer-div .t2 .pln, #editorpane .t2 .pun, #ui-editor-outer-div .t2 .opn, #ui-editor-outer-div .t2 .clo, #ui-editor-outer-div .t2 .dec { color: rgb(51, 51, 51) }</style><style id="publish-layout" type="text/css">.linepath { }</style><style id="webfonts-style" type="text/css">@font-face {}@font-face {}@font-face {}@font-face {}@font-face {}@font-face {}@font-face {}@font-face {}@font-face {}@font-face {}@font-face {}@font-face {}</style></code></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 17 Dec 2025 10:00:00 +0000</pubDate></item></channel></rss>