Books and online material to ramp up on “Identity Management”

Hi all,   This is a very frequent question from customers and partners. How can I discover and train myself on IDentity and Access (IDA)products ? Here is a link of books and online training for that. Hope this helps !   ForeFront Identity Manager (FIM) This book is written by an MVP,  David Lundell…

0

Reverse engineering: Understanding application (Web) complexity

    Part 1: the problem. With UAG, you can provide remote access towards many types of applications:   ·         Web applications: The “client” is in this case a simple browser, and dialog with go through UAG that will act as the reverse proxy. ·         “TCP” applications: the “client” of the application is an executable…

0

Implementing UAG/SSO with SCOM (With VNEXT, France)

Note from Fred ESNOUF : This article has been written by Hicham Bardawil (Hicham.Bardawil@vNext.fr) UAG expert working for Vnext. I am just hosting his article since he used some of my previous posts to finalize his configuration. Congratulations Hicham ! You’ve seen in previous articles how to implement Web SSO through UAG for applications that…

0