SlideShare a Scribd company logo
1 of 33
Download to read offline
Courtesy of InfraMatix 
http://www.IDMChecklist.com 
Comparing Forefront Identity Manager vs. Other Identity Managers
Here we compare Microsoft FIM with Oracle and CA, 
the market leaders 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
Microsoft Forefront Identity Manager 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
Microsoft’s Forefront Identity Manager is quite different from CA and Oracle 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
Some of the key differences include: 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
•FIM replaces the concepts of roles and attributes with policy objects 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
•The system is more tightly integrated with the Windows environment 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
•User self-service lets users request access through applications via group membership 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
•Microsoft has fewer governance, certification and audit functions 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
•Microsoft calls connectors management agents 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
•Workflow drives synchronization 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
•Programmers use Visual Studio to design workflows 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
•Access management is limited to .Net, SAP with Kerberos, UNIX login with Active Directory, and a few others 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
Oracle 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
Differences between Oracle and Microsoft are: 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
•Administrators can assign risk points to user metadata for certification purposes 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
•Provisioning is driven by roles and attributes 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
•Oracle includes a forms process for manual provisioning to legacy apps that do not have an API 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
•Reconciliation flags users who have been granted access outside the provisioning process 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
•Administrators can use Oracle IDM or the JDeveloperJava IDE for workflow design 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
CA 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
Difference between CA and Microsoft include: 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
•CA is the first to offer IDM a Software as a Service (SaaS) 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
•The database is the eTrustDirectory LDAP, a CA product 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
•CA has proprietary connections for UNIX, RACF, Exchange, and others, as does Microsoft and Oracle 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
•Business logic handler requires Java programming to assign user attributes when advanced logic is required 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
Bottom Line 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
Microsoft Forefront Identity Manager requires more programming skills to configure than Oracle or CA 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
Microsoft does not include governance within their product 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
Oracle and CA are easier to deploy, since they require less custom programming, plus they include governance 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
Have youinstalled Microsoft Forefront Identity Manager (FIM) in your organization? 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
Please share yourthoughts in the Comments section below 
Sponsored by http://www.IDMChecklist.com 
Veera Sandiparthi Founder of InfraMatix
Copyright © InfraMatix 
Is Your Company Adequately Protected from Security Risks? 
Download the Free 8 Point Identity Management Checklist Now at http://www.IDMChecklist.com

More Related Content

What's hot

SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014Kelly Grizzle
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud ServiceForgeRock
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access ManagementDLT Solutions
 
WSO2Con USA 2017: Introduction to Security: End-to-End Identity Management
WSO2Con USA 2017: Introduction to Security: End-to-End Identity ManagementWSO2Con USA 2017: Introduction to Security: End-to-End Identity Management
WSO2Con USA 2017: Introduction to Security: End-to-End Identity ManagementWSO2
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Systems, Inc.
 
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...CloudIDSummit
 
Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Kelly Grizzle
 
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity ServerWSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity ServerWSO2
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1OracleIDM
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMHasiniG
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Evolveum: About the company and its product - midPoint
Evolveum: About the company and its product - midPointEvolveum: About the company and its product - midPoint
Evolveum: About the company and its product - midPointEvolveum
 
CASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICECASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICEForgeRock
 
Case Study: University of California, Berkeley and San Francisco
Case Study: University of California, Berkeley and San FranciscoCase Study: University of California, Berkeley and San Francisco
Case Study: University of California, Berkeley and San FranciscoForgeRock
 
SCIM in the Real World: Adoption is Growing
SCIM in the Real World: Adoption is GrowingSCIM in the Real World: Adoption is Growing
SCIM in the Real World: Adoption is GrowingKelly Grizzle
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant Saravanan Purushothaman
 
Round table guide
Round table guideRound table guide
Round table guideOracleIDM
 

What's hot (20)

SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud Service
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
WSO2Con USA 2017: Introduction to Security: End-to-End Identity Management
WSO2Con USA 2017: Introduction to Security: End-to-End Identity ManagementWSO2Con USA 2017: Introduction to Security: End-to-End Identity Management
WSO2Con USA 2017: Introduction to Security: End-to-End Identity Management
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security Analysis
 
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
 
Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0
 
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity ServerWSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
Hayat resume 1
Hayat resume 1Hayat resume 1
Hayat resume 1
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Evolveum: About the company and its product - midPoint
Evolveum: About the company and its product - midPointEvolveum: About the company and its product - midPoint
Evolveum: About the company and its product - midPoint
 
CASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICECASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICE
 
Case Study: University of California, Berkeley and San Francisco
Case Study: University of California, Berkeley and San FranciscoCase Study: University of California, Berkeley and San Francisco
Case Study: University of California, Berkeley and San Francisco
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
SCIM in the Real World: Adoption is Growing
SCIM in the Real World: Adoption is GrowingSCIM in the Real World: Adoption is Growing
SCIM in the Real World: Adoption is Growing
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant
 
Round table guide
Round table guideRound table guide
Round table guide
 

Similar to Comparing forefront identity manager vs. other identity managers

IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17 IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17 Natalia Kataoka
 
Optimizing IAM with Single Sign-On From the Cloud to On-Premise
Optimizing IAM with Single Sign-On From the Cloud to On-PremiseOptimizing IAM with Single Sign-On From the Cloud to On-Premise
Optimizing IAM with Single Sign-On From the Cloud to On-Premisemycroftinc
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfVishnuGone
 
Top10 Characteristics of Awesome Apps
Top10 Characteristics of Awesome AppsTop10 Characteristics of Awesome Apps
Top10 Characteristics of Awesome AppsCasey Lee
 
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...VMworld
 
CyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfCyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfInfosec Train
 
CyberArk Interview Questions and Answers for 2023.pdf
CyberArk Interview Questions and Answers for 2023.pdfCyberArk Interview Questions and Answers for 2023.pdf
CyberArk Interview Questions and Answers for 2023.pdfinfosec train
 
CyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfCyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfinfosec train
 
Session 3 - i4Trust components for Identity Management and Access Control i4T...
Session 3 - i4Trust components for Identity Management and Access Control i4T...Session 3 - i4Trust components for Identity Management and Access Control i4T...
Session 3 - i4Trust components for Identity Management and Access Control i4T...FIWARE
 
[Infographic] Transforming IT through RPA and AI
[Infographic] Transforming IT through RPA and AI[Infographic] Transforming IT through RPA and AI
[Infographic] Transforming IT through RPA and AIUiPath
 
Virtualization Vs. Containers
Virtualization Vs. ContainersVirtualization Vs. Containers
Virtualization Vs. Containersactualtechmedia
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...oow123
 
Managing Internal, Private External, and Open Developer Ecosystems
Managing Internal, Private External, and Open Developer EcosystemsManaging Internal, Private External, and Open Developer Ecosystems
Managing Internal, Private External, and Open Developer EcosystemsLarry McDonough
 
Sailpoint vs Okta.pdf
Sailpoint vs Okta.pdfSailpoint vs Okta.pdf
Sailpoint vs Okta.pdfVishnuGone
 
Immutable Infrastructure
Immutable InfrastructureImmutable Infrastructure
Immutable Infrastructurestrikr .
 
Solaris 11.4 launch
Solaris 11.4 launchSolaris 11.4 launch
Solaris 11.4 launchScott Lynn
 
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...eG Innovations
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?ForgeRock
 

Similar to Comparing forefront identity manager vs. other identity managers (20)

IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17 IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
 
Optimizing IAM with Single Sign-On From the Cloud to On-Premise
Optimizing IAM with Single Sign-On From the Cloud to On-PremiseOptimizing IAM with Single Sign-On From the Cloud to On-Premise
Optimizing IAM with Single Sign-On From the Cloud to On-Premise
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 
Top10 Characteristics of Awesome Apps
Top10 Characteristics of Awesome AppsTop10 Characteristics of Awesome Apps
Top10 Characteristics of Awesome Apps
 
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
 
CyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfCyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdf
 
CyberArk Interview Questions and Answers for 2023.pdf
CyberArk Interview Questions and Answers for 2023.pdfCyberArk Interview Questions and Answers for 2023.pdf
CyberArk Interview Questions and Answers for 2023.pdf
 
CyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfCyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdf
 
Session 3 - i4Trust components for Identity Management and Access Control i4T...
Session 3 - i4Trust components for Identity Management and Access Control i4T...Session 3 - i4Trust components for Identity Management and Access Control i4T...
Session 3 - i4Trust components for Identity Management and Access Control i4T...
 
[Infographic] Transforming IT through RPA and AI
[Infographic] Transforming IT through RPA and AI[Infographic] Transforming IT through RPA and AI
[Infographic] Transforming IT through RPA and AI
 
Virtualization Vs. Containers
Virtualization Vs. ContainersVirtualization Vs. Containers
Virtualization Vs. Containers
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
 
Managing Internal, Private External, and Open Developer Ecosystems
Managing Internal, Private External, and Open Developer EcosystemsManaging Internal, Private External, and Open Developer Ecosystems
Managing Internal, Private External, and Open Developer Ecosystems
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
 
Sailpoint vs Okta.pdf
Sailpoint vs Okta.pdfSailpoint vs Okta.pdf
Sailpoint vs Okta.pdf
 
Immutable Infrastructure
Immutable InfrastructureImmutable Infrastructure
Immutable Infrastructure
 
Solaris 11.4 launch
Solaris 11.4 launchSolaris 11.4 launch
Solaris 11.4 launch
 
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Comparing forefront identity manager vs. other identity managers

  • 1. Courtesy of InfraMatix http://www.IDMChecklist.com Comparing Forefront Identity Manager vs. Other Identity Managers
  • 2. Here we compare Microsoft FIM with Oracle and CA, the market leaders Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 3. Microsoft Forefront Identity Manager Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 4. Microsoft’s Forefront Identity Manager is quite different from CA and Oracle Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 5. Some of the key differences include: Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 6. •FIM replaces the concepts of roles and attributes with policy objects Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 7. •The system is more tightly integrated with the Windows environment Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 8. •User self-service lets users request access through applications via group membership Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 9. •Microsoft has fewer governance, certification and audit functions Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 10. •Microsoft calls connectors management agents Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 11. •Workflow drives synchronization Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 12. •Programmers use Visual Studio to design workflows Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 13. •Access management is limited to .Net, SAP with Kerberos, UNIX login with Active Directory, and a few others Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 14. Oracle Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 15. Differences between Oracle and Microsoft are: Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 16. •Administrators can assign risk points to user metadata for certification purposes Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 17. •Provisioning is driven by roles and attributes Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 18. •Oracle includes a forms process for manual provisioning to legacy apps that do not have an API Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 19. •Reconciliation flags users who have been granted access outside the provisioning process Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 20. •Administrators can use Oracle IDM or the JDeveloperJava IDE for workflow design Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 21. CA Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 22. Difference between CA and Microsoft include: Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 23. •CA is the first to offer IDM a Software as a Service (SaaS) Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 24. •The database is the eTrustDirectory LDAP, a CA product Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 25. •CA has proprietary connections for UNIX, RACF, Exchange, and others, as does Microsoft and Oracle Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 26. •Business logic handler requires Java programming to assign user attributes when advanced logic is required Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 27. Bottom Line Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 28. Microsoft Forefront Identity Manager requires more programming skills to configure than Oracle or CA Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 29. Microsoft does not include governance within their product Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 30. Oracle and CA are easier to deploy, since they require less custom programming, plus they include governance Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 31. Have youinstalled Microsoft Forefront Identity Manager (FIM) in your organization? Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 32. Please share yourthoughts in the Comments section below Sponsored by http://www.IDMChecklist.com Veera Sandiparthi Founder of InfraMatix
  • 33. Copyright © InfraMatix Is Your Company Adequately Protected from Security Risks? Download the Free 8 Point Identity Management Checklist Now at http://www.IDMChecklist.com