Microsoft Identity Manager 2016 handbook :: a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices /
Annotation
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2016.
|
Schriftenreihe: | Professional expertise distilled.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Annotation |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (1 volume) : illustrations. |
ISBN: | 9781785284083 1785284088 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn956384021 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 160809s2016 enka of 001 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d N$T |d OCLCF |d C6I |d KSU |d AGLDB |d IGB |d STF |d AU@ |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d DXU | ||
020 | |a 9781785284083 |q (electronic bk.) | ||
020 | |a 1785284088 |q (electronic bk.) | ||
020 | |z 9781785283925 | ||
035 | |a (OCoLC)956384021 | ||
037 | |a CL0500000769 |b Safari Books Online | ||
050 | 4 | |a TK5105.59 | |
072 | 7 | |a COM |x 060404 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Steadman, David, |e author. | |
245 | 1 | 0 | |a Microsoft Identity Manager 2016 handbook : |b a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices / |c David Steadman, Jeff Ingalls. |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2016. | |
300 | |a 1 online resource (1 volume) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Professional expertise distilled | |
588 | 0 | |a Online resource; title from PDF title page (EBSCO, viewed August 30, 2016). | |
500 | |a Includes index. | ||
520 | 8 | |a Annotation |b A complete handbook on Microsoft Identity Manager 2016 from design considerations to operational best practicesAbout This Book Get to grips with the basics of identity management and get acquainted with the MIM components and functionalities Discover the newly-introduced product features and how they can help your organization A step-by-step guide to enhance your foundational skills in using Microsoft Identity Manager from those who have taught and supported large and small enterprise customersWho This Book Is ForIf you are an architect or a developer who wants to deploy, manage, and operate Microsoft Identity Manager 2016, then this book is for you. This book will also help the technical decision makers who want to improve their knowledge of Microsoft Identity Manager 2016. A basic understanding of Microsoft-based infrastructure using Active Directory is expected. Identity management beginners and experts alike will be able to apply the examples and scenarios to solve real-world customer problems.What You Will Learn Install MIM components Find out about the MIM synchronization, its configuration settings, and advantages Get to grips with the MIM service capabilities and develop custom activities Use the MIM Portal to provision and manage an account Mitigate access escalation and lateral movement risks using privileged access management Configure client certificate management and its detailed permission model Troubleshoot MIM components by enabling logging and reviewing logs Back up and restore the MIM 2015 configuration Discover more about periodic purging and the coding best practicesIn DetailMicrosoft Identity Manager 2016 is Microsoft's solution to identity management. When fully installed, the product utilizes SQL, SharePoint, IIS, web services, the .NET Framework, and SCSM to name a few, allowing it to be customized to meet nearly every business requirement.The book is divided into 15 chapters and begins with an overview of the product, what it does, and what it does not do. To better understand the concepts in MIM, we introduce a fictitious company and their problems and goals, then build an identity solutions to fit those goals. Over the course of this book, we cover topics such as MIM installation and configuration, user and group management options, self-service solutions, role-based access control, reducing security threats, and finally operational troubleshooting and best practices.By the end of this book, you will have gained the necessary skills to deploy, manage and operate Microsoft Identity Manager 2016 to meet your business requirements and solve real-world customer problems.Style and approach The concepts in the book are explained and illustrated with the help of screenshots as much as possible. We strive for readability and provide you with step-by-step instructions on the installation, configuration, and operation of the product.Throughout the book, you will be provided on-the-field knowledge that you won't get from whitepapers and help files. | |
505 | 0 | 0 | |t Microsoft Identity Manager 2016 Handbook: A complete handbook on Microsoft Identity Manager 2016 -- from design considerations to operational best practices |
650 | 0 | |a Computer networks |x Security measures |v Handbooks, manuals, etc. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |v Guides, manuels, etc. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
655 | 7 | |a Handbooks and manuals |2 fast | |
830 | 0 | |a Professional expertise distilled. |0 http://id.loc.gov/authorities/names/no2015143013 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1289338 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 1289338 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn956384021 |
---|---|
_version_ | 1816882357137833984 |
adam_text | |
any_adam_object | |
author | Steadman, David |
author_facet | Steadman, David |
author_role | aut |
author_sort | Steadman, David |
author_variant | d s ds |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Microsoft Identity Manager 2016 Handbook: A complete handbook on Microsoft Identity Manager 2016 -- from design considerations to operational best practices |
ctrlnum | (OCoLC)956384021 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05305cam a2200517 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn956384021</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu|||unuuu</controlfield><controlfield tag="008">160809s2016 enka of 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">C6I</subfield><subfield code="d">KSU</subfield><subfield code="d">AGLDB</subfield><subfield code="d">IGB</subfield><subfield code="d">STF</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DXU</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785284083</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1785284088</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781785283925</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)956384021</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000769</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060404</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Steadman, David,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Microsoft Identity Manager 2016 handbook :</subfield><subfield code="b">a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices /</subfield><subfield code="c">David Steadman, Jeff Ingalls.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2016.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Professional expertise distilled</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (EBSCO, viewed August 30, 2016).</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Annotation</subfield><subfield code="b">A complete handbook on Microsoft Identity Manager 2016 from design considerations to operational best practicesAbout This Book Get to grips with the basics of identity management and get acquainted with the MIM components and functionalities Discover the newly-introduced product features and how they can help your organization A step-by-step guide to enhance your foundational skills in using Microsoft Identity Manager from those who have taught and supported large and small enterprise customersWho This Book Is ForIf you are an architect or a developer who wants to deploy, manage, and operate Microsoft Identity Manager 2016, then this book is for you. This book will also help the technical decision makers who want to improve their knowledge of Microsoft Identity Manager 2016. A basic understanding of Microsoft-based infrastructure using Active Directory is expected. Identity management beginners and experts alike will be able to apply the examples and scenarios to solve real-world customer problems.What You Will Learn Install MIM components Find out about the MIM synchronization, its configuration settings, and advantages Get to grips with the MIM service capabilities and develop custom activities Use the MIM Portal to provision and manage an account Mitigate access escalation and lateral movement risks using privileged access management Configure client certificate management and its detailed permission model Troubleshoot MIM components by enabling logging and reviewing logs Back up and restore the MIM 2015 configuration Discover more about periodic purging and the coding best practicesIn DetailMicrosoft Identity Manager 2016 is Microsoft's solution to identity management. When fully installed, the product utilizes SQL, SharePoint, IIS, web services, the .NET Framework, and SCSM to name a few, allowing it to be customized to meet nearly every business requirement.The book is divided into 15 chapters and begins with an overview of the product, what it does, and what it does not do. To better understand the concepts in MIM, we introduce a fictitious company and their problems and goals, then build an identity solutions to fit those goals. Over the course of this book, we cover topics such as MIM installation and configuration, user and group management options, self-service solutions, role-based access control, reducing security threats, and finally operational troubleshooting and best practices.By the end of this book, you will have gained the necessary skills to deploy, manage and operate Microsoft Identity Manager 2016 to meet your business requirements and solve real-world customer problems.Style and approach The concepts in the book are explained and illustrated with the help of screenshots as much as possible. We strive for readability and provide you with step-by-step instructions on the installation, configuration, and operation of the product.Throughout the book, you will be provided on-the-field knowledge that you won't get from whitepapers and help files.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Microsoft Identity Manager 2016 Handbook: A complete handbook on Microsoft Identity Manager 2016 -- from design considerations to operational best practices</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Guides, manuels, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Handbooks and manuals</subfield><subfield code="2">fast</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Professional expertise distilled.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2015143013</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1289338</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1289338</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Handbooks and manuals fast |
genre_facet | Handbooks and manuals |
id | ZDB-4-EBA-ocn956384021 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:27:19Z |
institution | BVB |
isbn | 9781785284083 1785284088 |
language | English |
oclc_num | 956384021 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) : illustrations. |
psigel | ZDB-4-EBA |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Packt Publishing, |
record_format | marc |
series | Professional expertise distilled. |
series2 | Professional expertise distilled |
spelling | Steadman, David, author. Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices / David Steadman, Jeff Ingalls. Birmingham, UK : Packt Publishing, 2016. 1 online resource (1 volume) : illustrations. text txt rdacontent computer c rdamedia online resource cr rdacarrier Professional expertise distilled Online resource; title from PDF title page (EBSCO, viewed August 30, 2016). Includes index. Annotation A complete handbook on Microsoft Identity Manager 2016 from design considerations to operational best practicesAbout This Book Get to grips with the basics of identity management and get acquainted with the MIM components and functionalities Discover the newly-introduced product features and how they can help your organization A step-by-step guide to enhance your foundational skills in using Microsoft Identity Manager from those who have taught and supported large and small enterprise customersWho This Book Is ForIf you are an architect or a developer who wants to deploy, manage, and operate Microsoft Identity Manager 2016, then this book is for you. This book will also help the technical decision makers who want to improve their knowledge of Microsoft Identity Manager 2016. A basic understanding of Microsoft-based infrastructure using Active Directory is expected. Identity management beginners and experts alike will be able to apply the examples and scenarios to solve real-world customer problems.What You Will Learn Install MIM components Find out about the MIM synchronization, its configuration settings, and advantages Get to grips with the MIM service capabilities and develop custom activities Use the MIM Portal to provision and manage an account Mitigate access escalation and lateral movement risks using privileged access management Configure client certificate management and its detailed permission model Troubleshoot MIM components by enabling logging and reviewing logs Back up and restore the MIM 2015 configuration Discover more about periodic purging and the coding best practicesIn DetailMicrosoft Identity Manager 2016 is Microsoft's solution to identity management. When fully installed, the product utilizes SQL, SharePoint, IIS, web services, the .NET Framework, and SCSM to name a few, allowing it to be customized to meet nearly every business requirement.The book is divided into 15 chapters and begins with an overview of the product, what it does, and what it does not do. To better understand the concepts in MIM, we introduce a fictitious company and their problems and goals, then build an identity solutions to fit those goals. Over the course of this book, we cover topics such as MIM installation and configuration, user and group management options, self-service solutions, role-based access control, reducing security threats, and finally operational troubleshooting and best practices.By the end of this book, you will have gained the necessary skills to deploy, manage and operate Microsoft Identity Manager 2016 to meet your business requirements and solve real-world customer problems.Style and approach The concepts in the book are explained and illustrated with the help of screenshots as much as possible. We strive for readability and provide you with step-by-step instructions on the installation, configuration, and operation of the product.Throughout the book, you will be provided on-the-field knowledge that you won't get from whitepapers and help files. Microsoft Identity Manager 2016 Handbook: A complete handbook on Microsoft Identity Manager 2016 -- from design considerations to operational best practices Computer networks Security measures Handbooks, manuals, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Handbooks and manuals fast Professional expertise distilled. http://id.loc.gov/authorities/names/no2015143013 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1289338 Volltext |
spellingShingle | Steadman, David Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices / Professional expertise distilled. Microsoft Identity Manager 2016 Handbook: A complete handbook on Microsoft Identity Manager 2016 -- from design considerations to operational best practices Computer networks Security measures Handbooks, manuals, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast |
title | Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices / |
title_alt | Microsoft Identity Manager 2016 Handbook: A complete handbook on Microsoft Identity Manager 2016 -- from design considerations to operational best practices |
title_auth | Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices / |
title_exact_search | Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices / |
title_full | Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices / David Steadman, Jeff Ingalls. |
title_fullStr | Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices / David Steadman, Jeff Ingalls. |
title_full_unstemmed | Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices / David Steadman, Jeff Ingalls. |
title_short | Microsoft Identity Manager 2016 handbook : |
title_sort | microsoft identity manager 2016 handbook a complete handbook on microsoft identity manager 2016 from design considerations to operational best practices |
title_sub | a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices / |
topic | Computer networks Security measures Handbooks, manuals, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast |
topic_facet | Computer networks Security measures Handbooks, manuals, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Handbooks and manuals |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1289338 |
work_keys_str_mv | AT steadmandavid microsoftidentitymanager2016handbookacompletehandbookonmicrosoftidentitymanager2016fromdesignconsiderationstooperationalbestpractices |