Oxford Computer Group enables your business to be efficient and competitive through innovative identity management, identity-driven security, and identity governance solutions.

For over a decade, we have been harnessing the power of digital identity to protect organizations’ data, realize cloud strategies, and maintain compliance.

Combining deep understanding of business processes and wide-ranging expertise of implementing enabling technologies from Microsoft and other partners, we can make your vision a reality.

Award-winning identity solutions

We are a Microsoft Solutions Partner for Security, and have won Microsoft’s Partner of the Year Award 8 times, and been finalists 7 times. We offer consistent, high quality, creative and efficient IT solutions.
Discover our Award-Winning Solutions Imagine the possibilities!

Case study: Streamlining Identity & Access Management Post Acquisition

Oxford Computer Group helped a consumer goods company streamline the Mergers & Acquisitions processes associated with identities for the companies they acquire.

Finding a resource like Oxford Computer Group is uncommon. They are credible and experienced in the identity space. Without OCG, we couldn’t have done what we’ve done so far.

Rich R, System Architect, Louisiana
More reviews
move from mim to the cloud, identity governance, azure identity governance, entra id governance

New Webinar Recording

Transitioning from MIM to Microsoft Entra for Cloud-First IAM

OCG CTO James Cowling presents five different options for transitioning from on-premises MIM to a Microsoft-Entra focused solution.

View Recording

Latest articles & resources See all

Latest case studies & projects See all

Webinar recordings See all webinar recordings

IDENTITY INVERSION: PUTTING MICROSOFT ENTRA ID AT THE CENTER OF IDENTITY & AUTHENTICATION

Moving the center of identity and authentication away from on-premises directories and towards a Zero Trust security model.

VIEW WEBINAR

HOW DO VERIFIABLE CREDENTIALS AND DECENTRALIZED IDENTITIES WORK?

Learn what they are, how they work, and why they’re important.

VIEW WEBINAR

Read our most popular blogs

HOW DOES CONTINUOUS ACCESS EVALUATION FIT INTO YOUR ZERO TRUST STRATEGY?

In this post-perimeter security world, how end-users authenticate to and access corporate resources should be the top priority for CISOs and security teams.

Read more

TRANSITIONING AWAY FROM MIM IN A CLOUD-FIRST WORLD

This blog series examines the options and key considerations to help MIM users to determine their path to the cloud.

Read more

As well as identity consulting we offer...

TOP TRAINING

Our specialist training team, Oxford Computer Training, offers the world’s best Azure and MIM/FIM and PAM courses.

Read more

TOOLS FOR IDENTITY PROJECTS

Simplify processes, reduce development time, and save money on your identity project with our tools for MIM and FIM.

Read more

When we say we're good, we mean it!

Award winning identity solutionsConsistently Winning
Awarded Microsoft’s Partner of the Year 8 times

Identity Masterclass with John CraddockCustomer Feedback
Don’t just take our word for it, read what our customers think

Trusted Globally
We are THE go-to company for Microsoft identity solutions