Expiring Today—Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How to determine which Identity management method to use

Posted on 2008-06-12
2
Medium Priority
?
269 Views
Last Modified: 2013-12-04
I have a client who needs me to review MIIS, ADFS and AD Forest-level trusts to determine which method to use to link two organizations for several shared applications. Some apps are web-based other are client-server apps. Can you suggest a briefing which would shed some light on strengths and weaknesses of each Identity Integration method?
TIA!
JohnD
0
Comment
Question by:johndarby
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 19

Accepted Solution

by:
CoccoBill earned 2000 total points
ID: 21777666
It all depends on the requirements. ADFS provides SSO to web applications whereas MIIS/ILM are for more complex, non-web identity management. If you require proper provisioning you should look into Microsoft's Identity Lifetime Manager 2007 (http://www.microsoft.com/windowsserver2003/technologies/idm/ilm.mspx).

http://technet.microsoft.com/en-us/library/bb821278(TechNet.10).aspx

You can also find a lot of good information at miisexperts.org.
0
 
LVL 1

Author Comment

by:johndarby
ID: 21782138
Very succinct, thanks Bill!
0

Featured Post

Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question