Book Image

Microsoft Identity Manager 2016 Handbook

By : David Steadman, Jeff Ingalls
Book Image

Microsoft Identity Manager 2016 Handbook

By: David Steadman, Jeff Ingalls

Overview of this book

Microsoft Identity Manager 2016 is Microsoft’s solution to identity management. When fully installed, the product utilizes SQL, SharePoint, IIS, web services, the .NET Framework, and SCSM to name a few, allowing it to be customized to meet nearly every business requirement. The book is divided into 15 chapters and begins with an overview of the product, what it does, and what it does not do. To better understand the concepts in MIM, we introduce a fictitious company and their problems and goals, then build an identity solutions to fit those goals. Over the course of this book, we cover topics such as MIM installation and configuration, user and group management options, self-service solutions, role-based access control, reducing security threats, and finally operational troubleshooting and best practices. By the end of this book, you will have gained the necessary skills to deploy, manage and operate Microsoft Identity Manager 2016 to meet your business requirements and solve real-world customer problems.
Table of Contents (22 chapters)
Microsoft Identity Manager 2016 Handbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Creating and managing distribution groups


After allowing employees to create distribution groups earlier, we can now see what they would look like from a user's perspective.

There are different parts and steps involved in managing distribution groups. Let's start with how John creates a new distribution list:

  1. David (who is an employee) logs on to the MIM portal, and selects My DGs. So far, it is empty. He would like to create one, so he clicks on New:

    Note

    Note

    If your users are unable to log in to the portal, confirm that the accountName and Sid are populated with domains. Also confirm that the following two MPRs are enabled:

    • General: Users can read non-administrative configuration resources

    • User management: Users can read attributes of their own

  2. He gives his new group a display name, Hunters, and an e-mail alias, Hunters. A good description is always useful so that others can decide whether this is a group they would like to join:

  3. David will automatically be added as the first member, and he...