TechEd IT Professional EMEA: Identity and Access Management Top 5

Previously I shared the Top 5 of the client and the Windows Server track now it’s time to talk about Identity and Access management owned by Gary Williams

Connecting Active Directory to Microsoft Cloud Services

Learn how to augment your existing IT infrastructure with Microsoft Services. Manage and secure end user access to cloud services using your existing investment in Active Directory. Enable end users to access cloud services through existing Active Directory accounts, the same way they access your intranet-hosted software today. Enable existing software to use new service capabilities without re-writes. And do it all through the use of open and standard protocols.

Windows Server 2008 Active Directory Best Practices!

This session explores experiences and best practices related to Windows Server 2008 Active Directory features such as RODC and fine grained password policies. You may also be wondering how to run your Domain Controllers in light of other Windows Server 2008 features, such as Hyper-V. Can you run your branch offices with an RODC and can it be run as a virtual machine? Should you use Server Core instead? Can you leverage RODCs in the DMZ in addition to branch offices? What are the best practices to achieve this? Active Directory Change Auditing is a compelling feature but it can be difficult to find machines and events across a distributed set of machines. How can Windows Server 2008 help you to address this challenge to better monitor the security activities of Active Directory? We used to be limited to a single password policy per domain but today we can have many! What are the best practices to implement Fine Grained Password Policy? If you have interest in these questions and are looking for practical answers that you can put into practice, attend this session!

Infrastructure services for SOA security and federation: "Geneva" Security Token Services

The claims-based identity model enables an easier way to build applications that are identity-driven, support a variety of audiences and authentication mechanisms and can plug into a heterogeneous infrastructure using standards-based protocols, all without requiring application developers to write a lot of code. Key to the model is the Security Token Service (STS) which issues claims for applications to consume and hosts policies that determine what claims a user will get when accessing a specific application. In this session learn about Microsoft Code Name "Geneva", an STS integrated with Active Directory and Windows CardSpace that provides infrastructure services for federation, claims-aware applications and SOA security.

Using Active Directory Domain Services for Linux-Servers

If you have to manage a mixed environment and if you have Linux-servers like Apache or Samba running, why not using the ADDS for authentication? This session will show you how to integrate those servers in ADDS using LDAP and Kerberos and will give you the ideas to integrate other services as well.

Identity Lifecycle Manager 2 (Part 1): Empowering users with self-service identity management solutions

Learn how to use Identity Lifecycle Manager (ILM) "2" to bring easy-to-use, intuitive self-service solutions to your end users. This session is focused on showing you how to use ILM "2" to address self-service group management and password management scenarios, with an eye toward planning and deployment guidance for real-world production implementation. We will dive into these popular scenarios and show you how to get started today testing and planning ILM "2" self-service solutions.

Technorati Tags: TechEd IT Professional,IAM,Windows Server 2008,Active Directory