Oxford Computer Group enables your business to be efficient and competitive through innovative identity management, identity-driven security, and identity governance solutions.

For over a decade, we have been harnessing the power of digital identity to protect organizations’ data, realize cloud strategies, and maintain compliance.

Combining deep understanding of business processes and wide-ranging expertise of implementing enabling technologies from Microsoft and other partners, we can make your vision a reality.

Award-winning identity solutions

We are a Microsoft Gold Partner, and have won Microsoft’s Partner of the Year Award 8 times, most recently in 2018, and been finalists 6 times. We offer consistent, high quality, creative and efficient IT solutions.
Discover our Award-Winning Solutions Imagine the possibilities!

Case study: Building a secure self-service portal with Azure AD B2C

Manufacturer Intralox used Azure AD B2C to build a secure, self-service portal that customers can access with their own corporate identities.

We continue to use OCG because we know the people and like the people; they’re very knowledgeable. They are a really great company to work with.

Patrick, Illinois
More reviews
Azure AD Modern Authentication

Upcoming Webinar Sept 23rd

A Deep Dive into Azure AD’s Modern Authentication Protocols

Learn how Azure AD and Azure AD B2C utilize modern protocols like OAuth 2.0 and OpenID Connect to provide trusts across multiple security boundaries..

Register

COVID-19 Resource Page

Resources to help enable a productive and secure remote workforce during the COVID-19 pandemic.

Read more

Latest articles & resources See all

Latest case studies & projects See all

Webinar recordings See all webinar recordings

GOVERNING TEAMS: TAKE CONTROL OF YOUR MICROSOFT TEAMS ENVIRONMENT

Managing identities, security, and governance in Microsoft Teams.

VIEW WEBINAR

WHAT YOU NEED TO KNOW ABOUT CLOUD ACCESS SECURITY BROKERS

Where do CASB solutions come into play?

VIEW WEBINAR

Read our most popular blogs

HOW DOES CONTINUOUS ACCESS EVALUATION FIT INTO YOUR ZERO TRUST STRATEGY?

In this post-perimeter security world, how end-users authenticate to and access corporate resources should be the top priority for CISOs and security teams.

Read more

UNDERSTANDING LDAP CHANNEL BINDING AND LDAP SIGNING REQUIREMENTS

Dive deeper into LDAP channel binding and LDAP signing and learn recommendations for getting started on resolving insecure LDAP communications.

Read more

As well as identity consulting we offer...

TOP TRAINING

Our specialist training team, Oxford Computer Training, offers the world’s best Azure and MIM/FIM and PAM courses.

Read more

TOOLS FOR IDENTITY PROJECTS

Simplify processes, reduce development time, and save money on your identity project with our tools for MIM and FIM.

Read more

When we say we're good, we mean it!

Award winning identity solutionsConsistently Winning
Awarded Microsoft’s Partner of the Year 8 times

Identity Masterclass with John CraddockCustomer Feedback
Don’t just take our word for it, read what our customers think

Trusted Globally
We are THE go-to company for Microsoft identity solutions