Reader small image

You're reading from  Microsoft Forefront Identity Manager 2010 R2 Handbook

Product typeBook
Published inAug 2012
PublisherPackt
ISBN-139781849685368
Edition1st Edition
Right arrow
Author (1)
Kent Nordstrom
Kent Nordstrom
author image
Kent Nordstrom

Kent Nordström wrote his first lines of code in the late 70s so he's been working with IT for quite some time now. When Microsoft released its Windows 2000 operating system he started a close relationship with them that has continued since. For many years Kent has been working part time as a sub-contractor to Microsoft Consulting Services and has been doing many of the implementations of FIM and its predecessors for multinational companies and large organizations in Sweden. Apart from FIM, Kent is also well known within the community for his knowledge around Forefront TMG, Forefront UAG and PKI. Find out more by visiting his blog on http://konab.com.
Read more about Kent Nordstrom

Right arrow

Capacity planning


At the Microsoft download center, you can download the Forefront Identity Manager Capacity Planning Guide (http://aka.ms/FIMCapacityPlanning). I will not dig deep into capacity planning in this book, but rather make sure your setup is made in a way that allows you to easily make your FIM environment expand to cope with future needs.

If you look at the following table, you'll see that capacity planning is not easy since there is no straight answer to the problem. If I have 10,000 users, how should I plan my FIM environment? There are too many other parameters to look at.

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Microsoft Forefront Identity Manager 2010 R2 Handbook
Published in: Aug 2012Publisher: PacktISBN-13: 9781849685368

Author (1)

author image
Kent Nordstrom

Kent Nordström wrote his first lines of code in the late 70s so he's been working with IT for quite some time now. When Microsoft released its Windows 2000 operating system he started a close relationship with them that has continued since. For many years Kent has been working part time as a sub-contractor to Microsoft Consulting Services and has been doing many of the implementations of FIM and its predecessors for multinational companies and large organizations in Sweden. Apart from FIM, Kent is also well known within the community for his knowledge around Forefront TMG, Forefront UAG and PKI. Find out more by visiting his blog on http://konab.com.
Read more about Kent Nordstrom

Design factor

Considerations

Topology

The distribution of the FIM services among computers on the network.

Hardware

The physical hardware and any virtualized hardware specifications that you are running for each FIM component. This includes CPU, memory, network adapter, and hard drive configurations.

FIM policy configuration objects

The number and type of FIM policy configuration objects, which...