Book Image

Microsoft Forefront Identity Manager 2010 R2 Handbook

By : Kent Nordstrom
Book Image

Microsoft Forefront Identity Manager 2010 R2 Handbook

By: Kent Nordstrom

Overview of this book

Microsoft's Forefront Identity Manager simplifies enterprise identity management for end users by automating admin tasks and integrating the infrastructure of an enterprise with strong authentication systems. The "Microsoft Forefront Identity Manager 2010 R2 Handbook" is an in-depth guide to Identity Management. You will learn how to manage users and groups and implement self-service parts. This book also covers basic Certificate Management and troubleshooting. Throughout the book we will follow a fictional case study. You will see how to implement IM and also set up Smart Card logon for strong administrative accounts within Active Directory. You will learn to implement all the features of FIM 2010 R2. You will see how to install a complete FIM 2010 R2 infrastructure including both test and production environment. You will be introduced to Self-Service management of both users and groups. FIM Reports to audit the identity management lifecycle are also discussed in detail. With the "Microsoft Forefront Identity Manager 2010 R2 Handbook" you will be able implement and manage FIM 2010 R2 almost effortlessly.
Table of Contents (21 chapters)
Microsoft Forefront Identity Manager 2010 R2 Handbook
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
8
Using FIM to Manage Office 365 and Other Cloud Identities
Afterword
Index

Creating Management Agents


Before we even start to use our FIM implementation to manage identities, we need to decide where the information about the identities will come from and where the information will go.

It is also very important that we start off with the essential connections and then add other connections after verifying that the basics are working.

A very typical scenario is the one we have—The Company has an HR (Human Resource) system that will, for the most part, work as the source of identity information. Then it has Active Directory, which is the primary system to receive identity information.

The basic flow will be HR - FIM - AD.

But that is only the basic flow, and as you will see later in this book, there are other sources of information and also other targets.

Active Directory

Almost 100 percent of the FIM implementations have at least one Management Agent connected to an Active Directory.

There are a few things to consider before creating this Management Agent. I suggest you...