Book description
A complete handbook on Microsoft Identity Manager 2016 – from design considerations to operational best practices
About This Book
Get to grips with the basics of identity management and get acquainted with the MIM components and functionalities
Discover the newly-introduced product features and how they can help your organization
A step-by-step guide to enhance your foundational skills in using Microsoft Identity Manager from those who have taught and supported large and small enterprise customers
Who This Book Is For
If you are an architect or a developer who wants to deploy, manage, and operate Microsoft Identity Manager 2016, then this book is for you. This book will also help the technical decision makers who want to improve their knowledge of Microsoft Identity Manager 2016. A basic understanding of Microsoft-based infrastructure using Active Directory is expected. Identity management beginners and experts alike will be able to apply the examples and scenarios to solve real-world customer problems.
What You Will Learn
Install MIM components
Find out about the MIM synchronization, its configuration settings, and advantages
Get to grips with the MIM service capabilities and develop custom activities
Use the MIM Portal to provision and manage an account
Mitigate access escalation and lateral movement risks using privileged access management
Configure client certificate management and its detailed permission model
Troubleshoot MIM components by enabling logging and reviewing logs
Back up and restore the MIM 2015 configuration
Discover more about periodic purging and the coding best practices
In Detail
Microsoft Identity Manager 2016 is Microsoft’s solution to identity management. When fully installed, the product utilizes SQL, SharePoint, IIS, web services, the .NET Framework, and SCSM to name a few, allowing it to be customized to meet nearly every business requirement.
The book is divided into 15 chapters and begins with an overview of the product, what it does, and what it does not do. To better understand the concepts in MIM, we introduce a fictitious company and their problems and goals, then build an identity solutions to fit those goals. Over the course of this book, we cover topics such as MIM installation and configuration, user and group management options, self-service solutions, role-based access control, reducing security threats, and finally operational troubleshooting and best practices.
By the end of this book, you will have gained the necessary skills to deploy, manage and operate Microsoft Identity Manager 2016 to meet your business requirements and solve real-world customer problems.
Style and approach
The concepts in the book are explained and illustrated with the help of screenshots as much as possible. We strive for readability and provide you with step-by-step instructions on the installation, configuration, and operation of the product.
Throughout the book, you will be provided on-the-field knowledge that you won’t get from whitepapers and help files.
Table of contents
-
Microsoft Identity Manager 2016 Handbook
- Table of Contents
- Microsoft Identity Manager 2016 Handbook
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Preface
- 1. Overview of Microsoft Identity Manager 2016
- 2. Installation
- 3. MIM Sync Configuration
- 4. MIM Service Configuration
-
5. User Management
- Additional sync engine information
- Portal MPRs for user management
- Configuring sets for user management
- Inbound synchronization rules
- Outbound synchronization rules
- Provisioning
- Managing users in a phone system
- Managing users in Active Directory
- Temporal sets
- Self-service using MIM Portal
- Managing Exchange
- More considerations
- Summary
- 6. Group Management
- 7. Role-Based Access Control with BHOLD
- 8. Reducing Threats with PAM
- 9. Password Management
- 10. Overview of Certificate Management
- 11. Installation and the Client Side of Certificate Management
- 12. Certificate Management Scenarios
- 13. Reporting
- 14. Troubleshooting
-
15. Operations and Best Practices
- Expectations versus reality
- Automating run profiles
- Best practices concepts
- Backup and restore
- Backing up the synchronization encryption key
- Restoring the MIM synchronization DB
- Restoring the MIM service DB and portal
- Additional backup considerations
- Operational health
- Database maintenance
- SQL best practices
- MIM synchronization best practices
- MIM portal best practices
- Other best practices
- Summary
- Index
Product information
- Title: Microsoft Identity Manager 2016 Handbook
- Author(s):
- Release date: July 2016
- Publisher(s): Packt Publishing
- ISBN: 9781785283925
You might also like
book
Access Control and Identity Management, 3rd Edition
Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and …
book
Identity and Access Management
provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM …
video
SC-300: Microsoft Identity and Access Administrator
The Microsoft Identity and Access Administrator designs, implements, and operates an organization’s identity and access management …
book
Mastering Identity and Access Management with Microsoft Azure - Second Edition
Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in …