This course follows on from the Implementation (Foundation) course (OCG520), and involves lots of hands-on exercises to cover the more advanced aspects of FIM 2010 R2, and put consultants in a position to be ready to deploy the technology.Mer information & fakta
"Oxford Computer Group (OCG) is an IT service company that specializes in Identity and Security with a particular focus on Identity and Access Management (IAM) and Information Protection. With 600+ enterprise projects completed and more than 6000 people trained on Microsoft IDA technologies we have a wealth of expertise, solution components and training courses to offer."
Du lär dig
At the end of the course the student will be able to:
- Manage users, groups, policy, and credentials through the FIM 2010 portal
- Configure the portal to manage additional resource types, including look and feel, modified forms, and navigation
- Handle more complex workflows and Management Policy Rules (MPRs), including temporal MPRs and custom workflows
- Manage both Classic and Portal Rule synchronization, using custom rules extension where necessary
- Build simple customs Management Agents (MAs)
- Understand how to operate and troubleshoot an implementation, including using WMI, backup, and disaster recovery considerations
- Understand the technical architecture and different installation topologies of FIM 2010
- Understand a wide range of techniques and architectures, and how to go about implementing more complex architectures
FIM 2010 Reminder
The course starts with a tour of the features of FIM 2010 that were covered in the Foundation Course, pointing out those areas which this course will further develop. This is an opportunity to clear up any misunderstandings before launching into a lot of new information.
This module covers the interface configuration, including look and feel, and navigation. The portal schema model is also considered: resources, attributes, bindings and validations; use of XPath and search scopes; usage keywords and localization; how to extend the schema.
This module covers metaverse schema extension, and synchronization in depth. It explores the whole process, including holograms and how to troubleshoot synchronization errors. Synchronization Rules (including changes introduced by R2) are mapped to the classic rules, identifying where to use each type, and where extensions are required. A hybrid approach to synchronization is introduced as part of a more general discussion about best practice.
More Complex Workflows and MPRs
In this module we examine the FIM Service and application database. This covers more complex workflows using functions and parameters, and temporal (time-based) MPRs for expiration, notification and delayed actions. We create and import some simple
Windows Workflow Foundation workflows.
Classic Rule Extensions
This module introduces (coded) extensions of classic MA configuration, including coded provisioning, attribute flow, and deprovisioning. Topics include DLL extension architecture, metaverse and MA DLL concepts, and creating and debugging extensions. Suggestions are made for effective management and best practices.
More Management Agents
We then cover File Based MAs, and provide notes about the other types not explicitly covered. We also introduce extensible connectivity MAs (custom MAs) including the new types made possible by the release of FIM R2. While we clearly cannot teach programming in this course we attempt to satisfy the needs of the more developeroriented students by providing examples (which are not covered in detail), while focusing on the configuration and outcomes. Password extensions are covered briefly.
Installation and Alternative Topologies
This module covers installation, but also considers likely production topologies, how to scale it, and other considerations (like upgrade and migration of ILM installations). Installation of the new password web sites released with R2 is also covered.
Operation, Troubleshooting, and Reporting
This module looks at all the sources of information in FIM 2010, including: ILM 2007 features (MV and CS search, event log, operations tool etc.); troubleshooting via (for example) preview and analyzing requests; and extracting data directly from the synchronization database. It covers the use of PowerShell cmdlets for extracting and migrating configuration data – including pitfalls and essential workarounds. It also introduces the reporting functionality included with FIM 2010 R2.
Techniques and Architectures
The final module takes what you have learned on this course and applies it, in a very practical way, to a number of scenarios, including techniques such as: approaches to delta imports and manual precedence, and approaches to additional types of group
management. Finally it provides more general advice in the form of dos and don’ts.
This course is intended for Systems Engineers and Architects (and it is also useful for developers) who need to gain a deeper understanding of how FIM 2010 can be implemented. They will have attended the FIM 2010 Implementation Foundation Course (OCG520). Students will find it an advantage if they can read simple Visual Basic code, but this is not an absolute prerequisite. Where code is used, the emphasis will be on the need for code and how it fits into the overall architecture, rather than on the programming details.