Cargando…

Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management /

Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managin...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Nordström, Kent
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Pub., ©2012.
Colección:Professional expertise distilled.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 EBSCO_ocn810317545
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 120910s2012 enk of 001 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d E7B  |d OCLCQ  |d N$T  |d UMI  |d COO  |d OCL  |d DEBSZ  |d OCLCQ  |d N$T  |d OCLCF  |d OCLCQ  |d OCLCO  |d YDXCP  |d OCL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCA  |d OCLCQ  |d AZK  |d ZCU  |d OCLCQ  |d MERUC  |d OCLCQ  |d JBG  |d VTS  |d CEF  |d ICG  |d OCLCQ  |d NLE  |d UKMGB  |d OCLCQ  |d STF  |d UAB  |d DKC  |d OCLCQ  |d M8D  |d UKAHL  |d HS0  |d OCLCO  |d OCLCQ  |d OCLCO 
016 7 |a 018015154  |2 Uk 
019 |a 817811983  |a 827799989  |a 961546595  |a 962602574 
020 |a 9781849685375  |q (electronic bk.) 
020 |a 1849685371  |q (electronic bk.) 
020 |a 1283593998  |q (electronic bk.) 
020 |a 9781283593991  |q (electronic bk.) 
020 |z 9781849685368 
020 |z 1849685363 
029 1 |a AU@  |b 000050590808 
029 1 |a AU@  |b 000062538871 
029 1 |a CHNEW  |b 000621330 
029 1 |a DEBBG  |b BV041120180 
029 1 |a DEBBG  |b BV043094655 
029 1 |a DEBBG  |b BV044168093 
029 1 |a DEBSZ  |b 396680739 
029 1 |a DEBSZ  |b 397378378 
029 1 |a DEBSZ  |b 421357452 
029 1 |a GBVCP  |b 785366695 
029 1 |a NZ1  |b 15196349 
029 1 |a UKMGB  |b 018015154 
029 1 |a AU@  |b 000067110554 
029 1 |a DKDLA  |b 820120-katalog:999935620105765 
035 |a (OCoLC)810317545  |z (OCoLC)817811983  |z (OCoLC)827799989  |z (OCoLC)961546595  |z (OCoLC)962602574 
037 |a CL0500000191  |b Safari Books Online 
050 4 |a TK5105.59 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Nordström, Kent. 
245 1 0 |a Microsoft forefront identity manager 2010 R2 handbook :  |b a complete handbook on FIM 2010 R2 covering both identity and certificate management /  |c Kent Nordström. 
260 |a Birmingham, UK :  |b Packt Pub.,  |c ©2012. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
380 |a Handbook 
490 1 |a Professional expertise distilled 
520 |a Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managing FIM 2010 R2 in your business, then this book is for you. You will need to have a basic understanding of Microsoft based infrastructure using Active Directory. If you are new to Forefront Identity Management, the case-study approach of this book will help you to understand the concepts and implement them. 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1:The Story in this Book; The Company; The challenges; Provisioning of users; Identity lifecycle procedures; Highly Privileged Accounts (HPA); Password management; Traceability; The solutions; Implement FIM 2010 R2; Start using smart cards; Implement federation; The environment; Moving forward; Summary; Chapter 2:Overview of FIM 2010 R2; The history of FIM 2010 R2; FIM Synchronization Service (FIM Sync); Management Agents; Non-declarative vs. declarative synchronization 
505 8 |a Password synchronizationFIM Service Management Agent; FIM Service; Request pipeline; FIM Service Management Agent; Management Policy Rules (MPRs); FIM Portal; Self Service Password Reset (SSPR); FIM Reporting; FIM Certificate Management (FIM CM); Certificate Management portal; Licensing; Summary; Chapter 3:Installation; Development versus production; Capacity planning; Separating roles; Databases; FIM features; Hardware; Installation order; Prerequisites; Databases; Collation and languages; SQL aliases; FIM-Dev; SQL; SCSM; Web servers; FIM Portal; FIM Password Reset 
505 8 |a FIM Certificate ManagementService accounts; Kerberos configuration; SETSPN; Delegation; System Center Service Manager Console; Installation; FIM Synchronization Service; FIM Service and FIM Portal; FIM Password Reset portal; FIM Certificate Management; SCSM management; SCSM Data Warehouse; Post-installation configuration; Granting FIM Service access to FIM Sync; Securing the FIM Service mailbox; Disabling indexing in SharePoint; Redirecting to IdentityManagement; Enforcing Kerberos; Editing binding in IIS for FIM Password sites; Registering SCSM Manager in Data Warehouse 
505 8 |a FIM post-install scripts for Data WarehouseSummary; Chapter 4:Basic Configuration; Creating Management Agents; Active Directory; Least privileged; Directory replication; Password reset; Creating AD MA; HR (SQL Server); Creating SQL MA; Run profiles; Single or Multi step; Schema management; FIM Sync versus FIM Service schema; Object deletion in MV; Modifying FIM Service schema; FIM Service MA; Creating the FIM Service MA; Creating run profiles; First import; Filtering accounts; Initial load versus scheduled runs; Moving configuration from development to production 
505 8 |a Maintenance mode for productionDisabling maintenance mode; Exporting FIM Synchronization Service settings; Exporting FIM Service settings; Exporting the FIM Service schema; Exporting the FIM Service policy; Generating the difference files; Generating the schema difference; Generating the policy difference; Importing to production; Importing custom code; Importing the Service schema difference; Importing the Synchronization Service settings; Importing the FIM Service policy; PowerShell scripts; Summary; Chapter 5:User Management; Modifying MPRs for user management 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer networks  |x Security measures  |v Handbooks, manuals, etc. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |v Guides, manuels, etc. 
650 7 |a COMPUTERS S  |x Security  |x Networking.  |2 bisacsh 
650 7 |a COMPUTERS S  |x Security  |x Online Safety & Privacy.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
655 7 |a Handbooks and manuals  |2 fast 
830 0 |a Professional expertise distilled. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781849685368/?ar  |z Texto completo 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=481281  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26944094 
938 |a ebrary  |b EBRY  |n ebr10598981 
938 |a EBSCOhost  |b EBSC  |n 481281 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 390644 
938 |a YBP Library Services  |b YANK  |n 9655031 
994 |a 92  |b IZTAP