How to determine which Identity management method to use

Posted on 2008-06-12
Medium Priority
Last Modified: 2013-12-04
I have a client who needs me to review MIIS, ADFS and AD Forest-level trusts to determine which method to use to link two organizations for several shared applications. Some apps are web-based other are client-server apps. Can you suggest a briefing which would shed some light on strengths and weaknesses of each Identity Integration method?
Question by:John Darby
LVL 19

Accepted Solution

CoccoBill earned 2000 total points
ID: 21777666
It all depends on the requirements. ADFS provides SSO to web applications whereas MIIS/ILM are for more complex, non-web identity management. If you require proper provisioning you should look into Microsoft's Identity Lifetime Manager 2007 (http://www.microsoft.com/windowsserver2003/technologies/idm/ilm.mspx).


You can also find a lot of good information at miisexperts.org.

Author Comment

by:John Darby
ID: 21782138
Very succinct, thanks Bill!

Featured Post

The 14th Annual Expert Award Winners

The results are in! Meet the top members of our 2017 Expert Awards. Congratulations to all who qualified!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

A bad practice commonly found during an account life cycle is to set its password to an initial, insecure password. The Password Reset Tool was developed to make the password reset process easier and more secure.
Sometimes it necessary to set special permissions on user objects.  For instance when using a Blackberry server, the SendAs permission needs to be set. I see many admins struggle with the setting that permission only to see it disappear within a few…
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

621 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question