Search icon
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Microsoft Identity Manager 2016 Handbook

You're reading from  Microsoft Identity Manager 2016 Handbook

Product type Book
Published in Jul 2016
Publisher Packt
ISBN-13 9781785283925
Pages 692 pages
Edition 1st Edition
Languages
Authors (2):
David Steadman David Steadman
Profile icon David Steadman
Jeff Ingalls Jeff Ingalls
Profile icon Jeff Ingalls
View More author details

Table of Contents (22) Chapters

Microsoft Identity Manager 2016 Handbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
1. Overview of Microsoft Identity Manager 2016 2. Installation 3. MIM Sync Configuration 4. MIM Service Configuration 5. User Management 6. Group Management 7. Role-Based Access Control with BHOLD 8. Reducing Threats with PAM 9. Password Management 10. Overview of Certificate Management 11. Installation and the Client Side of Certificate Management 12. Certificate Management Scenarios 13. Reporting 14. Troubleshooting 15. Operations and Best Practices Index

Managing users in a phone system


A phone system could be a simple SQL table. The basic idea is that all employees should be in the phone system, and MIM is responsible for creating them. We discuss this simple example to show you how to add additional data from a secondary system to an identity created by a system configured for Metaverse projection.

Once the users are created in the phone system, the system is responsible for entering phone and office location data, which is then imported back into MIM.

To manage the users in this SQL-based phone system, we need to create the MA. Since we have walked through the steps on how to do this for our HR system, we will point out some basics:

  1. The Management Agent type would be SQL Server, and we give it the name Phone. Using an SQL alias of dbPhone, we connect to the Phone database and the PhoneData table containing the phone data.

  2. Next, we set the ID column as anchor and the Object Type as person:

  3. MIM will manage the users in the phone system, and...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}