The FIM Experience–Exercise 1

Here is the recording of the first lab exercise from the Implementing Forefront Identity Manager 2010 training. In this exercise we are going to edit user identity data and observe the effect on other connected systems. Please watch this video in Full screen and in HD for higher quality and better user experience. Let me…

0

Open Standard Authentication in the Enterprise, Part 3

  In previous post we started to talk about different SSO solutions.  This post will cover another common SSO approach. Current Solutions Federal Agencies employ two primary strategies to provide Single Sign On across multiple Domains, Applications and across Agency boundaries: Application Resource Forests; (covered in previous post) Password Synchronization across different directories.   Password…

0

Re-Revoking Certificates with Different Reason Code

  One of my customers is using 3rd party Card Management System (CMS) to manage their smart cards. One of many common management tasks that such systems perform is revocation of the smart card and in particular the certificates issued to the given smart card. Well, of course CMS only originates the revocation request -…

0

Cool Windows 2008 posters

cool posters for download, check it out: http://www.microsoft.com/downloads/details.aspx?FamilyID=c2b9e44e-0bbd-47cb-bc09-b3d48be7f867&displaylang=en  

0

FBCA PKI cross-certification

For the last few months I’ve been helping large organization with their efforts to cross-certify their PKI infrastructure with Federal Bridge Certification Authority (FBCA). We had some technical challenges with interoperability between our systems which we were able to resolve fairly quickly with some help from product group guys and our own tireless testing. But…

0

Publishing SharePoint with ISA 2006 and 2 factor authentication

ISA 2006 provides some great new capabilities for user authentication. Find more info on ISA at the following link http://www.microsoft.com/isa. On one of my recent projects I had to publish SharePoint Portal to Internet based users. The information on the portal is very sensitive and customer has made a decision to require two factor authentication. The…

0