The FIM Experience–Exercise 4–Video Demonstration

This is a continuation of the first lab from the Implementing Forefront Identity Manager 2010 training. Before watching this demonstration it might be helpful to watch the prior two demonstrations, but not required. In this demonstration we are going to perform the following tasks: Log on to Windows as a Contractor employee and reset his…

0

The FIM Experience–Exercise 2 and 3–Video Demonstration

This is a continuation of the first lab from the Implementing Forefront Identity Manager 2010 training. You can watch the first part of the lab here. In this demonstration we are going to perform the following tasks: Add new users and examine group memberships Add full-time employee Add a contractor Examine how groups are managed…

0

The FIM Experience–Exercise 1

Here is the recording of the first lab exercise from the Implementing Forefront Identity Manager 2010 training. In this exercise we are going to edit user identity data and observe the effect on other connected systems. Please watch this video in Full screen and in HD for higher quality and better user experience. Let me…

0

PKI Installation Made Easy–Video

Ever wonder how difficult it is to install a two tier PKI system? It is actually not that difficult. Watch this video with live step-by-step demonstration showing how to do just that. Entire system can be up and running in under one hour time frame. This is about 70 minutes video presentation showing how to…

0

FIM CM and Custom Subject Policy Module

Forefront Identity Manager Certificate Management (FIM CM) provides very useful function – it can create certificate with predefined subject, specified by the Administrator and enforced centrally on all certificates issued via FIM CM. Most PKI implementations are governed by Certificate Policy (CP) and applicable Certificate Practice Statement (CPS). Among many things, the CPS defines what…

0

Live and Learn

Learned a few little tidy bits this week, or maybe relearned what was known before. But some of it was painful discovery. I was building a lab with multiple physical servers and one big virtual server host. One of the virtual guests is TMG 2010 which is used in this lab as firewall/router between multiple…

0

Levels of Assurance and Claims-based authentication

  Federal Agencies must comply with OMB 04-04 publication. There is an established framework asserting different levels of assurance for digital identities, such as user accounts/passwords, Smart Cards and other types of tokens. Claims-based authentication solutions must support the proper assertion of the level of assurance for couple different reasons: STS must be able to…

0

Token Policy and STS

If you are familiar with PKI projects you are probably know about Certificate Policy (CP) and Certificate Practice Statements (CPS). Both based on published RFC and usually required in most PKI implementations. CP specify the policy for PKI and CPS specifies how this policy is implemented by each CA in your PKI solution. Usually it…

0

Claim Based Authentication IV

In previous three posts we examined how claim authentication flow works for users in the same domain as SharePoint site and for users from other organizations. As we have seen, the value for Role claim was based on the Active Directory group membership. For instance, Frank Miller from Fabrikam was given role of DrugTrial1Auditors in…

0

Claims Based Authentication – Part III

This is continuation of two previous posts. Please check them out first, otherwise this one might not make much sense at all. Step 6 in step-step guide configures Fabrikam STS with Relying Party and shows how to configure Information Cards to automate home realm discovery. I’m not going to talk about Information Cards yet, for…

0