|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn956384021 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
160809s2016 enka of 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d N$T
|d OCLCF
|d C6I
|d KSU
|d AGLDB
|d IGB
|d STF
|d AU@
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9781785284083
|q (electronic bk.)
|
020 |
|
|
|a 1785284088
|q (electronic bk.)
|
020 |
|
|
|z 9781785283925
|
029 |
1 |
|
|a GBVCP
|b 897168984
|
035 |
|
|
|a (OCoLC)956384021
|
037 |
|
|
|a CL0500000769
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|
072 |
|
7 |
|a COM
|x 060404
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Steadman, David,
|e author.
|
245 |
1 |
0 |
|a Microsoft Identity Manager 2016 handbook :
|b a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices /
|c David Steadman, Jeff Ingalls.
|
264 |
|
1 |
|a Birmingham, UK :
|b Packt Publishing,
|c 2016.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Professional expertise distilled
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed August 30, 2016).
|
500 |
|
|
|a Includes index.
|
520 |
8 |
|
|a Annotation
|b A complete handbook on Microsoft Identity Manager 2016 from design considerations to operational best practicesAbout This Book Get to grips with the basics of identity management and get acquainted with the MIM components and functionalities Discover the newly-introduced product features and how they can help your organization A step-by-step guide to enhance your foundational skills in using Microsoft Identity Manager from those who have taught and supported large and small enterprise customersWho This Book Is ForIf you are an architect or a developer who wants to deploy, manage, and operate Microsoft Identity Manager 2016, then this book is for you. This book will also help the technical decision makers who want to improve their knowledge of Microsoft Identity Manager 2016. A basic understanding of Microsoft-based infrastructure using Active Directory is expected. Identity management beginners and experts alike will be able to apply the examples and scenarios to solve real-world customer problems.What You Will Learn Install MIM components Find out about the MIM synchronization, its configuration settings, and advantages Get to grips with the MIM service capabilities and develop custom activities Use the MIM Portal to provision and manage an account Mitigate access escalation and lateral movement risks using privileged access management Configure client certificate management and its detailed permission model Troubleshoot MIM components by enabling logging and reviewing logs Back up and restore the MIM 2015 configuration Discover more about periodic purging and the coding best practicesIn DetailMicrosoft Identity Manager 2016 is Microsoft's solution to identity management. When fully installed, the product utilizes SQL, SharePoint, IIS, web services, the .NET Framework, and SCSM to name a few, allowing it to be customized to meet nearly every business requirement.The book is divided into 15 chapters and begins with an overview of the product, what it does, and what it does not do. To better understand the concepts in MIM, we introduce a fictitious company and their problems and goals, then build an identity solutions to fit those goals. Over the course of this book, we cover topics such as MIM installation and configuration, user and group management options, self-service solutions, role-based access control, reducing security threats, and finally operational troubleshooting and best practices.By the end of this book, you will have gained the necessary skills to deploy, manage and operate Microsoft Identity Manager 2016 to meet your business requirements and solve real-world customer problems.Style and approach The concepts in the book are explained and illustrated with the help of screenshots as much as possible. We strive for readability and provide you with step-by-step instructions on the installation, configuration, and operation of the product.Throughout the book, you will be provided on-the-field knowledge that you won't get from whitepapers and help files.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer networks
|x Security measures
|v Handbooks, manuals, etc.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|v Guides, manuels, etc.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
655 |
|
7 |
|a Handbooks and manuals
|2 fast
|
830 |
|
0 |
|a Professional expertise distilled.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781785283925/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1289338
|
994 |
|
|
|a 92
|b IZTAP
|