In this chapter, we discussed why privileged access management is important, its components, and how it works. We gave you the component requirements and walked you through installing the module and verifying its functionality by demonstrating how an end user would perform a request. Considerations, installation of the sample, the custom PAM portal, and setting up multi-factor authentication was also discussed. Did we miss anything? You bet! Explore the official TechNet documents for PAM at http://bit.ly/MIMPAMTechNet.
In the next chapter, we will cover how MIM can help your organization save end user time, money, and frustration by setting up self-service password reset and password synchronization. Even though password management such as PAM is an option, we believe you will find it an invaluable enterprise service.