Book Image

Microsoft Forefront Identity Manager 2010 R2 Handbook

By : Kent Nordstrom
Book Image

Microsoft Forefront Identity Manager 2010 R2 Handbook

By: Kent Nordstrom

Overview of this book

Microsoft's Forefront Identity Manager simplifies enterprise identity management for end users by automating admin tasks and integrating the infrastructure of an enterprise with strong authentication systems. The "Microsoft Forefront Identity Manager 2010 R2 Handbook" is an in-depth guide to Identity Management. You will learn how to manage users and groups and implement self-service parts. This book also covers basic Certificate Management and troubleshooting. Throughout the book we will follow a fictional case study. You will see how to implement IM and also set up Smart Card logon for strong administrative accounts within Active Directory. You will learn to implement all the features of FIM 2010 R2. You will see how to install a complete FIM 2010 R2 infrastructure including both test and production environment. You will be introduced to Self-Service management of both users and groups. FIM Reports to audit the identity management lifecycle are also discussed in detail. With the "Microsoft Forefront Identity Manager 2010 R2 Handbook" you will be able implement and manage FIM 2010 R2 almost effortlessly.
Table of Contents (21 chapters)
Microsoft Forefront Identity Manager 2010 R2 Handbook
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
8
Using FIM to Manage Office 365 and Other Cloud Identities
Afterword
Index

Chapter 11. Customizing Data Transformations

We have so far been able to solve our problems using built-in functionality in FIM. But in many cases the data you are managing is not structured or formatted in a way that FIM can manage.

I have so far showed you how to build a couple of synchronization rules, and we have used a few of the out of the box functions available in FIM. For a complete list of all FIM functions available in synchronization rules, please take a look at http://aka.ms/FIMFunctions.

What we will find is that the built-in functionality will not cover all our needs. In this chapter we will look at:

  • Discussing the overall need and options for data transformation

  • An example when managing Microsoft Lync

  • Selective deprovisioning

  • The case with strange roles