Reader small image

You're reading from  Microsoft Forefront Identity Manager 2010 R2 Handbook

Product typeBook
Published inAug 2012
PublisherPackt
ISBN-139781849685368
Edition1st Edition
Right arrow
Author (1)
Kent Nordstrom
Kent Nordstrom
author image
Kent Nordstrom

Kent Nordström wrote his first lines of code in the late 70s so he's been working with IT for quite some time now. When Microsoft released its Windows 2000 operating system he started a close relationship with them that has continued since. For many years Kent has been working part time as a sub-contractor to Microsoft Consulting Services and has been doing many of the implementations of FIM and its predecessors for multinational companies and large organizations in Sweden. Apart from FIM, Kent is also well known within the community for his knowledge around Forefront TMG, Forefront UAG and PKI. Find out more by visiting his blog on http://konab.com.
Read more about Kent Nordstrom

Right arrow

Managing users in a phone system


The phone system at The Company is a simple SQL table in the eyes of FIM. The basic idea is that all employees, but not contractors, should be in the phone system and FIM is responsible for creating them.

Once the users are created in the phone system, this system is responsible for entering phone and office location data, which is then imported back into FIM.

I have earlier stated that I tend not to mix inbound and outbound data flow directions in the same synchronization rule, but the phone system is one where this is possible. Why? Well, because it is very simple and the users are completely managed by FIM.

To manage the users in the phone system, we need to create the MA for the phone system, to begin with. Since we have walked through the steps on how to do this before, I will just point out some basics:

  1. Management Agent type is SQL Server and I give it the name Phone.

  2. Using a SQL alias of dbPhone, I connect to the database—CompanyIdM—and table—PhoneData...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Microsoft Forefront Identity Manager 2010 R2 Handbook
Published in: Aug 2012Publisher: PacktISBN-13: 9781849685368

Author (1)

author image
Kent Nordstrom

Kent Nordström wrote his first lines of code in the late 70s so he's been working with IT for quite some time now. When Microsoft released its Windows 2000 operating system he started a close relationship with them that has continued since. For many years Kent has been working part time as a sub-contractor to Microsoft Consulting Services and has been doing many of the implementations of FIM and its predecessors for multinational companies and large organizations in Sweden. Apart from FIM, Kent is also well known within the community for his knowledge around Forefront TMG, Forefront UAG and PKI. Find out more by visiting his blog on http://konab.com.
Read more about Kent Nordstrom