Microsoft forefront identity manager 2010 R2 handbook :: a complete handbook on FIM 2010 R2 covering both identity and certificate management /
Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managin...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Pub.,
©2012.
|
Schriftenreihe: | Professional expertise distilled.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managing FIM 2010 R2 in your business, then this book is for you. You will need to have a basic understanding of Microsoft based infrastructure using Active Directory. If you are new to Forefront Identity Management, the case-study approach of this book will help you to understand the concepts and implement them. |
Beschreibung: | 1 online resource. |
ISBN: | 9781849685375 1849685371 1283593998 9781283593991 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn810317545 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 120910s2012 enk of 001 0 eng d | ||
040 | |a IDEBK |b eng |e pn |c IDEBK |d E7B |d OCLCQ |d N$T |d UMI |d COO |d OCL |d DEBSZ |d OCLCQ |d N$T |d OCLCF |d OCLCQ |d OCLCO |d YDXCP |d OCL |d OCLCQ |d OCLCO |d OCLCQ |d OCLCA |d OCLCQ |d AZK |d ZCU |d OCLCQ |d MERUC |d OCLCQ |d JBG |d VTS |d CEF |d ICG |d OCLCQ |d NLE |d UKMGB |d OCLCQ |d STF |d UAB |d DKC |d OCLCQ |d M8D |d UKAHL |d HS0 |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
016 | 7 | |a 018015154 |2 Uk | |
019 | |a 817811983 |a 827799989 |a 961546595 |a 962602574 | ||
020 | |a 9781849685375 |q (electronic bk.) | ||
020 | |a 1849685371 |q (electronic bk.) | ||
020 | |a 1283593998 |q (electronic bk.) | ||
020 | |a 9781283593991 |q (electronic bk.) | ||
020 | |z 9781849685368 | ||
020 | |z 1849685363 | ||
035 | |a (OCoLC)810317545 |z (OCoLC)817811983 |z (OCoLC)827799989 |z (OCoLC)961546595 |z (OCoLC)962602574 | ||
037 | |a CL0500000191 |b Safari Books Online | ||
050 | 4 | |a TK5105.59 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Nordström, Kent. | |
245 | 1 | 0 | |a Microsoft forefront identity manager 2010 R2 handbook : |b a complete handbook on FIM 2010 R2 covering both identity and certificate management / |c Kent Nordström. |
260 | |a Birmingham, UK : |b Packt Pub., |c ©2012. | ||
300 | |a 1 online resource. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
380 | |a Handbook | ||
490 | 1 | |a Professional expertise distilled | |
520 | |a Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managing FIM 2010 R2 in your business, then this book is for you. You will need to have a basic understanding of Microsoft based infrastructure using Active Directory. If you are new to Forefront Identity Management, the case-study approach of this book will help you to understand the concepts and implement them. | ||
505 | 0 | |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1:The Story in this Book; The Company; The challenges; Provisioning of users; Identity lifecycle procedures; Highly Privileged Accounts (HPA); Password management; Traceability; The solutions; Implement FIM 2010 R2; Start using smart cards; Implement federation; The environment; Moving forward; Summary; Chapter 2:Overview of FIM 2010 R2; The history of FIM 2010 R2; FIM Synchronization Service (FIM Sync); Management Agents; Non-declarative vs. declarative synchronization | |
505 | 8 | |a Password synchronizationFIM Service Management Agent; FIM Service; Request pipeline; FIM Service Management Agent; Management Policy Rules (MPRs); FIM Portal; Self Service Password Reset (SSPR); FIM Reporting; FIM Certificate Management (FIM CM); Certificate Management portal; Licensing; Summary; Chapter 3:Installation; Development versus production; Capacity planning; Separating roles; Databases; FIM features; Hardware; Installation order; Prerequisites; Databases; Collation and languages; SQL aliases; FIM-Dev; SQL; SCSM; Web servers; FIM Portal; FIM Password Reset | |
505 | 8 | |a FIM Certificate ManagementService accounts; Kerberos configuration; SETSPN; Delegation; System Center Service Manager Console; Installation; FIM Synchronization Service; FIM Service and FIM Portal; FIM Password Reset portal; FIM Certificate Management; SCSM management; SCSM Data Warehouse; Post-installation configuration; Granting FIM Service access to FIM Sync; Securing the FIM Service mailbox; Disabling indexing in SharePoint; Redirecting to IdentityManagement; Enforcing Kerberos; Editing binding in IIS for FIM Password sites; Registering SCSM Manager in Data Warehouse | |
505 | 8 | |a FIM post-install scripts for Data WarehouseSummary; Chapter 4:Basic Configuration; Creating Management Agents; Active Directory; Least privileged; Directory replication; Password reset; Creating AD MA; HR (SQL Server); Creating SQL MA; Run profiles; Single or Multi step; Schema management; FIM Sync versus FIM Service schema; Object deletion in MV; Modifying FIM Service schema; FIM Service MA; Creating the FIM Service MA; Creating run profiles; First import; Filtering accounts; Initial load versus scheduled runs; Moving configuration from development to production | |
505 | 8 | |a Maintenance mode for productionDisabling maintenance mode; Exporting FIM Synchronization Service settings; Exporting FIM Service settings; Exporting the FIM Service schema; Exporting the FIM Service policy; Generating the difference files; Generating the schema difference; Generating the policy difference; Importing to production; Importing custom code; Importing the Service schema difference; Importing the Synchronization Service settings; Importing the FIM Service policy; PowerShell scripts; Summary; Chapter 5:User Management; Modifying MPRs for user management | |
650 | 0 | |a Computer networks |x Security measures |v Handbooks, manuals, etc. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |v Guides, manuels, etc. | |
650 | 7 | |a COMPUTERS S |x Security |x Networking. |2 bisacsh | |
650 | 7 | |a COMPUTERS S |x Security |x Online Safety & Privacy. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
655 | 7 | |a Handbooks and manuals |2 fast | |
758 | |i has work: |a Microsoft Forefront Identity Manager 2010 R2 Handbook (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYpKRmpPgCTGXw6ckThBrq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
830 | 0 | |a Professional expertise distilled. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=481281 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH26944094 | ||
938 | |a ebrary |b EBRY |n ebr10598981 | ||
938 | |a EBSCOhost |b EBSC |n 481281 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 390644 | ||
938 | |a YBP Library Services |b YANK |n 9655031 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn810317545 |
---|---|
_version_ | 1816882208622772225 |
adam_text | |
any_adam_object | |
author | Nordström, Kent |
author_facet | Nordström, Kent |
author_role | |
author_sort | Nordström, Kent |
author_variant | k n kn |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1:The Story in this Book; The Company; The challenges; Provisioning of users; Identity lifecycle procedures; Highly Privileged Accounts (HPA); Password management; Traceability; The solutions; Implement FIM 2010 R2; Start using smart cards; Implement federation; The environment; Moving forward; Summary; Chapter 2:Overview of FIM 2010 R2; The history of FIM 2010 R2; FIM Synchronization Service (FIM Sync); Management Agents; Non-declarative vs. declarative synchronization Password synchronizationFIM Service Management Agent; FIM Service; Request pipeline; FIM Service Management Agent; Management Policy Rules (MPRs); FIM Portal; Self Service Password Reset (SSPR); FIM Reporting; FIM Certificate Management (FIM CM); Certificate Management portal; Licensing; Summary; Chapter 3:Installation; Development versus production; Capacity planning; Separating roles; Databases; FIM features; Hardware; Installation order; Prerequisites; Databases; Collation and languages; SQL aliases; FIM-Dev; SQL; SCSM; Web servers; FIM Portal; FIM Password Reset FIM Certificate ManagementService accounts; Kerberos configuration; SETSPN; Delegation; System Center Service Manager Console; Installation; FIM Synchronization Service; FIM Service and FIM Portal; FIM Password Reset portal; FIM Certificate Management; SCSM management; SCSM Data Warehouse; Post-installation configuration; Granting FIM Service access to FIM Sync; Securing the FIM Service mailbox; Disabling indexing in SharePoint; Redirecting to IdentityManagement; Enforcing Kerberos; Editing binding in IIS for FIM Password sites; Registering SCSM Manager in Data Warehouse FIM post-install scripts for Data WarehouseSummary; Chapter 4:Basic Configuration; Creating Management Agents; Active Directory; Least privileged; Directory replication; Password reset; Creating AD MA; HR (SQL Server); Creating SQL MA; Run profiles; Single or Multi step; Schema management; FIM Sync versus FIM Service schema; Object deletion in MV; Modifying FIM Service schema; FIM Service MA; Creating the FIM Service MA; Creating run profiles; First import; Filtering accounts; Initial load versus scheduled runs; Moving configuration from development to production Maintenance mode for productionDisabling maintenance mode; Exporting FIM Synchronization Service settings; Exporting FIM Service settings; Exporting the FIM Service schema; Exporting the FIM Service policy; Generating the difference files; Generating the schema difference; Generating the policy difference; Importing to production; Importing custom code; Importing the Service schema difference; Importing the Synchronization Service settings; Importing the FIM Service policy; PowerShell scripts; Summary; Chapter 5:User Management; Modifying MPRs for user management |
ctrlnum | (OCoLC)810317545 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06325cam a2200661 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn810317545</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">120910s2012 enk of 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IDEBK</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IDEBK</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">UMI</subfield><subfield code="d">COO</subfield><subfield code="d">OCL</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLE</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">UAB</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">HS0</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">018015154</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">817811983</subfield><subfield code="a">827799989</subfield><subfield code="a">961546595</subfield><subfield code="a">962602574</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849685375</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849685371</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283593998</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283593991</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781849685368</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1849685363</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)810317545</subfield><subfield code="z">(OCoLC)817811983</subfield><subfield code="z">(OCoLC)827799989</subfield><subfield code="z">(OCoLC)961546595</subfield><subfield code="z">(OCoLC)962602574</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000191</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nordström, Kent.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Microsoft forefront identity manager 2010 R2 handbook :</subfield><subfield code="b">a complete handbook on FIM 2010 R2 covering both identity and certificate management /</subfield><subfield code="c">Kent Nordström.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Pub.,</subfield><subfield code="c">©2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="380" ind1=" " ind2=" "><subfield code="a">Handbook</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Professional expertise distilled</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managing FIM 2010 R2 in your business, then this book is for you. You will need to have a basic understanding of Microsoft based infrastructure using Active Directory. If you are new to Forefront Identity Management, the case-study approach of this book will help you to understand the concepts and implement them.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1:The Story in this Book; The Company; The challenges; Provisioning of users; Identity lifecycle procedures; Highly Privileged Accounts (HPA); Password management; Traceability; The solutions; Implement FIM 2010 R2; Start using smart cards; Implement federation; The environment; Moving forward; Summary; Chapter 2:Overview of FIM 2010 R2; The history of FIM 2010 R2; FIM Synchronization Service (FIM Sync); Management Agents; Non-declarative vs. declarative synchronization</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Password synchronizationFIM Service Management Agent; FIM Service; Request pipeline; FIM Service Management Agent; Management Policy Rules (MPRs); FIM Portal; Self Service Password Reset (SSPR); FIM Reporting; FIM Certificate Management (FIM CM); Certificate Management portal; Licensing; Summary; Chapter 3:Installation; Development versus production; Capacity planning; Separating roles; Databases; FIM features; Hardware; Installation order; Prerequisites; Databases; Collation and languages; SQL aliases; FIM-Dev; SQL; SCSM; Web servers; FIM Portal; FIM Password Reset</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">FIM Certificate ManagementService accounts; Kerberos configuration; SETSPN; Delegation; System Center Service Manager Console; Installation; FIM Synchronization Service; FIM Service and FIM Portal; FIM Password Reset portal; FIM Certificate Management; SCSM management; SCSM Data Warehouse; Post-installation configuration; Granting FIM Service access to FIM Sync; Securing the FIM Service mailbox; Disabling indexing in SharePoint; Redirecting to IdentityManagement; Enforcing Kerberos; Editing binding in IIS for FIM Password sites; Registering SCSM Manager in Data Warehouse</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">FIM post-install scripts for Data WarehouseSummary; Chapter 4:Basic Configuration; Creating Management Agents; Active Directory; Least privileged; Directory replication; Password reset; Creating AD MA; HR (SQL Server); Creating SQL MA; Run profiles; Single or Multi step; Schema management; FIM Sync versus FIM Service schema; Object deletion in MV; Modifying FIM Service schema; FIM Service MA; Creating the FIM Service MA; Creating run profiles; First import; Filtering accounts; Initial load versus scheduled runs; Moving configuration from development to production</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Maintenance mode for productionDisabling maintenance mode; Exporting FIM Synchronization Service settings; Exporting FIM Service settings; Exporting the FIM Service schema; Exporting the FIM Service policy; Generating the difference files; Generating the schema difference; Generating the policy difference; Importing to production; Importing custom code; Importing the Service schema difference; Importing the Synchronization Service settings; Importing the FIM Service policy; PowerShell scripts; Summary; Chapter 5:User Management; Modifying MPRs for user management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Guides, manuels, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS S</subfield><subfield code="x">Security</subfield><subfield code="x">Networking.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS S</subfield><subfield code="x">Security</subfield><subfield code="x">Online Safety & Privacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Handbooks and manuals</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Microsoft Forefront Identity Manager 2010 R2 Handbook (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYpKRmpPgCTGXw6ckThBrq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Professional expertise distilled.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=481281</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH26944094</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10598981</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">481281</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">390644</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">9655031</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Handbooks and manuals fast |
genre_facet | Handbooks and manuals |
id | ZDB-4-EBA-ocn810317545 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:24:56Z |
institution | BVB |
isbn | 9781849685375 1849685371 1283593998 9781283593991 |
language | English |
oclc_num | 810317545 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource. |
psigel | ZDB-4-EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Packt Pub., |
record_format | marc |
series | Professional expertise distilled. |
series2 | Professional expertise distilled |
spelling | Nordström, Kent. Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management / Kent Nordström. Birmingham, UK : Packt Pub., ©2012. 1 online resource. text txt rdacontent computer c rdamedia online resource cr rdacarrier data file rda Handbook Professional expertise distilled Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managing FIM 2010 R2 in your business, then this book is for you. You will need to have a basic understanding of Microsoft based infrastructure using Active Directory. If you are new to Forefront Identity Management, the case-study approach of this book will help you to understand the concepts and implement them. Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1:The Story in this Book; The Company; The challenges; Provisioning of users; Identity lifecycle procedures; Highly Privileged Accounts (HPA); Password management; Traceability; The solutions; Implement FIM 2010 R2; Start using smart cards; Implement federation; The environment; Moving forward; Summary; Chapter 2:Overview of FIM 2010 R2; The history of FIM 2010 R2; FIM Synchronization Service (FIM Sync); Management Agents; Non-declarative vs. declarative synchronization Password synchronizationFIM Service Management Agent; FIM Service; Request pipeline; FIM Service Management Agent; Management Policy Rules (MPRs); FIM Portal; Self Service Password Reset (SSPR); FIM Reporting; FIM Certificate Management (FIM CM); Certificate Management portal; Licensing; Summary; Chapter 3:Installation; Development versus production; Capacity planning; Separating roles; Databases; FIM features; Hardware; Installation order; Prerequisites; Databases; Collation and languages; SQL aliases; FIM-Dev; SQL; SCSM; Web servers; FIM Portal; FIM Password Reset FIM Certificate ManagementService accounts; Kerberos configuration; SETSPN; Delegation; System Center Service Manager Console; Installation; FIM Synchronization Service; FIM Service and FIM Portal; FIM Password Reset portal; FIM Certificate Management; SCSM management; SCSM Data Warehouse; Post-installation configuration; Granting FIM Service access to FIM Sync; Securing the FIM Service mailbox; Disabling indexing in SharePoint; Redirecting to IdentityManagement; Enforcing Kerberos; Editing binding in IIS for FIM Password sites; Registering SCSM Manager in Data Warehouse FIM post-install scripts for Data WarehouseSummary; Chapter 4:Basic Configuration; Creating Management Agents; Active Directory; Least privileged; Directory replication; Password reset; Creating AD MA; HR (SQL Server); Creating SQL MA; Run profiles; Single or Multi step; Schema management; FIM Sync versus FIM Service schema; Object deletion in MV; Modifying FIM Service schema; FIM Service MA; Creating the FIM Service MA; Creating run profiles; First import; Filtering accounts; Initial load versus scheduled runs; Moving configuration from development to production Maintenance mode for productionDisabling maintenance mode; Exporting FIM Synchronization Service settings; Exporting FIM Service settings; Exporting the FIM Service schema; Exporting the FIM Service policy; Generating the difference files; Generating the schema difference; Generating the policy difference; Importing to production; Importing custom code; Importing the Service schema difference; Importing the Synchronization Service settings; Importing the FIM Service policy; PowerShell scripts; Summary; Chapter 5:User Management; Modifying MPRs for user management Computer networks Security measures Handbooks, manuals, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. COMPUTERS S Security Networking. bisacsh COMPUTERS S Security Online Safety & Privacy. bisacsh Computer networks Security measures fast Handbooks and manuals fast has work: Microsoft Forefront Identity Manager 2010 R2 Handbook (Text) https://id.oclc.org/worldcat/entity/E39PCYpKRmpPgCTGXw6ckThBrq https://id.oclc.org/worldcat/ontology/hasWork Professional expertise distilled. FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=481281 Volltext |
spellingShingle | Nordström, Kent Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management / Professional expertise distilled. Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1:The Story in this Book; The Company; The challenges; Provisioning of users; Identity lifecycle procedures; Highly Privileged Accounts (HPA); Password management; Traceability; The solutions; Implement FIM 2010 R2; Start using smart cards; Implement federation; The environment; Moving forward; Summary; Chapter 2:Overview of FIM 2010 R2; The history of FIM 2010 R2; FIM Synchronization Service (FIM Sync); Management Agents; Non-declarative vs. declarative synchronization Password synchronizationFIM Service Management Agent; FIM Service; Request pipeline; FIM Service Management Agent; Management Policy Rules (MPRs); FIM Portal; Self Service Password Reset (SSPR); FIM Reporting; FIM Certificate Management (FIM CM); Certificate Management portal; Licensing; Summary; Chapter 3:Installation; Development versus production; Capacity planning; Separating roles; Databases; FIM features; Hardware; Installation order; Prerequisites; Databases; Collation and languages; SQL aliases; FIM-Dev; SQL; SCSM; Web servers; FIM Portal; FIM Password Reset FIM Certificate ManagementService accounts; Kerberos configuration; SETSPN; Delegation; System Center Service Manager Console; Installation; FIM Synchronization Service; FIM Service and FIM Portal; FIM Password Reset portal; FIM Certificate Management; SCSM management; SCSM Data Warehouse; Post-installation configuration; Granting FIM Service access to FIM Sync; Securing the FIM Service mailbox; Disabling indexing in SharePoint; Redirecting to IdentityManagement; Enforcing Kerberos; Editing binding in IIS for FIM Password sites; Registering SCSM Manager in Data Warehouse FIM post-install scripts for Data WarehouseSummary; Chapter 4:Basic Configuration; Creating Management Agents; Active Directory; Least privileged; Directory replication; Password reset; Creating AD MA; HR (SQL Server); Creating SQL MA; Run profiles; Single or Multi step; Schema management; FIM Sync versus FIM Service schema; Object deletion in MV; Modifying FIM Service schema; FIM Service MA; Creating the FIM Service MA; Creating run profiles; First import; Filtering accounts; Initial load versus scheduled runs; Moving configuration from development to production Maintenance mode for productionDisabling maintenance mode; Exporting FIM Synchronization Service settings; Exporting FIM Service settings; Exporting the FIM Service schema; Exporting the FIM Service policy; Generating the difference files; Generating the schema difference; Generating the policy difference; Importing to production; Importing custom code; Importing the Service schema difference; Importing the Synchronization Service settings; Importing the FIM Service policy; PowerShell scripts; Summary; Chapter 5:User Management; Modifying MPRs for user management Computer networks Security measures Handbooks, manuals, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. COMPUTERS S Security Networking. bisacsh COMPUTERS S Security Online Safety & Privacy. bisacsh Computer networks Security measures fast |
title | Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management / |
title_auth | Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management / |
title_exact_search | Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management / |
title_full | Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management / Kent Nordström. |
title_fullStr | Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management / Kent Nordström. |
title_full_unstemmed | Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management / Kent Nordström. |
title_short | Microsoft forefront identity manager 2010 R2 handbook : |
title_sort | microsoft forefront identity manager 2010 r2 handbook a complete handbook on fim 2010 r2 covering both identity and certificate management |
title_sub | a complete handbook on FIM 2010 R2 covering both identity and certificate management / |
topic | Computer networks Security measures Handbooks, manuals, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. COMPUTERS S Security Networking. bisacsh COMPUTERS S Security Online Safety & Privacy. bisacsh Computer networks Security measures fast |
topic_facet | Computer networks Security measures Handbooks, manuals, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. COMPUTERS S Security Networking. COMPUTERS S Security Online Safety & Privacy. Computer networks Security measures Handbooks and manuals |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=481281 |
work_keys_str_mv | AT nordstromkent microsoftforefrontidentitymanager2010r2handbookacompletehandbookonfim2010r2coveringbothidentityandcertificatemanagement |