Microsoft Forefront Identity Manager 2010 R2 Handbook (Anglais) Broché – 24 août 2012
Rentrée scolaire 2017 : découvrez notre boutique de livres, fournitures, cartables, ordinateurs, vêtements ... Voir plus.
|Neuf à partir de||Occasion à partir de|
- Choisissez parmi 17 000 points de collecte en France
- Les membres du programme Amazon Prime bénéficient de livraison gratuites illimitées
- Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
- Sélectionnez cette adresse lors de votre commande
Les clients ayant acheté cet article ont également acheté
Description du produit
Biographie de l'auteur
Kent Nordström wrote his first lines of code in the late 70s so he's been working with IT for quite some time now. When Microsoft released its Windows 2000 operating system he started a close relationship with them that has continued since. For many years Kent has been working part time as a sub-contractor to Microsoft Consulting Services and has been doing many of the implementations of FIM and its predecessors for multinational companies and large organizations in Sweden. Apart from FIM, Kent is also well known within the community for his knowledge around Forefront TMG, Forefront UAG and PKI. Find out more by visiting his blog on http://konab.com.
Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.
Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.
Détails sur le produit
Si vous vendez ce produit, souhaitez-vous suggérer des mises à jour par l'intermédiaire du support vendeur ?
Commentaires en ligne
Meilleurs commentaires des clients
Commentaires client les plus utiles sur Amazon.com (beta) (Peut contenir des commentaires issus du programme Early Reviewer Rewards)
Chapters 5, 6 and 7 cover user and group management, looking at synchronization between systems and the tricky issue of whether and how to delete items that have ended their life-cycle. One of the popular uses of FIM is also covered: self-service password reset, which allows users to reset their own passwords when they forget them. These chapters are where the text gets more technical and makes more assumptions regarding your previous knowledge. It was at this point that I started to need my own FIM test environment to follow along with the author. Now is a good time to go back and re-read chapters 2 and 4 and then re-read chapters 5, 6 and 7 for a better understanding.
Chapter 8 lacks the depth of previous chapters. It gives an overview of Office 365, Microsoft's cloud-based email and collaboration service, and discusses how Office 365 Directory Synchronization relates to FIM. You'll need some prior experience with Office 365 to get the most out of this chapter.
The FIM reporting functionality covered in chapter 9 is a new feature of the R2 version of FIM 2010. The reporting setup uses System Center Service Manager (SCSM) 2012 technology and you'll want to reach out to your SCSM specialist for support on this area as the coverage in the book is very brief.
The next three chapters introduce the reader to customizing the user interface and data transformations, and the penultimate chapter covers using FIM for certificate management. Chapter 13 describes how the author troubleshoots real-world issues when working on a Forefront Identity Manager implementation project.
You might be reading this book if you are preparing for the Microsoft Exam 70-158 "Forefront Indentity Manager 2010". If so you'll definitely want to study the plentiful extra documents that Kent provides the links to throughout the book.
Overall I think that those people planning to work with Microsoft Forefront Identity Manager 2010 R2 have good reason to be grateful that Kent Nordstrom took the trouble to create this book. It certainly serves as an excellent starting point for learning about the product.
My recommendation: Don't wait. Buy the book now.