Search icon
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Microsoft Identity Manager 2016 Handbook

You're reading from  Microsoft Identity Manager 2016 Handbook

Product type Book
Published in Jul 2016
Publisher Packt
ISBN-13 9781785283925
Pages 692 pages
Edition 1st Edition
Languages
Authors (2):
David Steadman David Steadman
Profile icon David Steadman
Jeff Ingalls Jeff Ingalls
Profile icon Jeff Ingalls
View More author details

Table of Contents (22) Chapters

Microsoft Identity Manager 2016 Handbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
1. Overview of Microsoft Identity Manager 2016 2. Installation 3. MIM Sync Configuration 4. MIM Service Configuration 5. User Management 6. Group Management 7. Role-Based Access Control with BHOLD 8. Reducing Threats with PAM 9. Password Management 10. Overview of Certificate Management 11. Installation and the Client Side of Certificate Management 12. Certificate Management Scenarios 13. Reporting 14. Troubleshooting 15. Operations and Best Practices Index

Models at a glance


There are some high-level models that most environments use to manage certificates. In the next few sections, we will uncover these models and the requirements and permissions needed to succeed with them. The Financial Company has already applied the self-service registration model as part of the manager-initiated model. The models are not explicit, but they are flexible, and TFC could use a mixture of both. Let's now look at the centralized management model.

The centralized management model

The centralized management model works well when there is a tightly controlled HR process or a security officer enrolls a smart card for the user, and in general cases where a random PIN is assigned to the card. When the card is received by the subscriber (that is, the user), then they would perform the initial online unblock. The helpdesk would be able to assist if an offline unblock operation is needed. In the centralized model, the following permissions would be needed:

Service Connection...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}