SlideShare a Scribd company logo
Integrated identity management delivering powerful self-service capabilities for
      end users and enhanced administrative tools and automation for IT professionals

      Microsoft® Forefront™                             Business Challenges                              Forefront Identity Manager
      Identity Manager 2010
                                                                                                         Benefits
      offers a comprehensive                            Organizations today are confronted
      solution for managing                             with a number of identity and access             Empowers people
      identities, credentials, and                      challenges that FIM can help address.            FIM puts the right tools in the hands of
      identity-based access policies                    Chief among these:                               end users, IT professionals, and developers
      across heterogeneous                              n   The burden of complexity on IT,              to increase their productivity and to lower
      environments. FIM empowers                            which must manage identities across          help desk and other costs.
      users with self service                               heterogeneous systems.                       n   Increases end-user productivity through
      password reset and embeds                         n   High help-desk costs associated with             self-help tools integrated into Office and
      self-help tools in Office so                          password resets and smart                        Windows®. Without calling the help desk,
      users can manage routine                              card deployment.                                 users can reset a password or smart card
      aspects of identity and                           n   Loss of end-user productivity because            PIN, create an e-mail distribution group,
      access, gives IT professionals                        users cannot manage the routine aspects          or add co-workers to a group. FIM portal
      rich administrative tools                             of their own identity and access.                also provides users with capabilities such
                                                                                                             as update their own profile, search for
      and enhanced automation,                          n   Lengthy development time for identity            co-workers.
      and delivers .NET and Web                             management customization because
      Services-based extensibility                          existing developer interfaces require
                                                                                                         n   Helps IT professionals manage identities
      for developers.                                       specialized knowledge.                           more efficiently through a SharePoint®–
                                                                                                             based administrative console. IT can use
                                                        n   Security gaps and risk to the business           the menu-driven user interface of the
                                                            due to noncompliance with internal and           console to create policies and workflows
                                                            external regulations.                            that govern account management and
                                                                                                             access throughout the enterprise.
                                                                                                         n   Increases developer productivity through
                                                                                                             extensibility. Developers can access
                                                                                                             Web Services–based APIs and .NET to
                                         Self-Service Integration
                                                                                                             customize FIM functionality through the
                FIM Portal                     D   END USER INTE         Windows Log On                      familiar Microsoft Visual Studio® and
                                            AN                     RFA
                                         IT                           CE                                     .NET development environments.
                                                                         S
                                                                                                         Delivers agility and efficiency
                                                                                                         Through automation, self-service, and
                                                                                                         rich extensibility, FIM reduces the
                               CTIVITY




                                             Empowers people                                             high costs and risk often associated
                                                                                                         with identity management.
                                                                             EX




LOB Applications                         Delivers agility & efficiency
                                                                                TEN
                            NNE




                                            Improves security &                                 Custom   n   Reduces costs through automation
                                                 compliance
                                                                                   SIB
                          CO




                                                                                                             and self-service. FIM automates the
                                                                                      ILI
                       US




                                                                                                             management of users, groups, and other
                                                                             T




                                                                         Y
                      O




                                                                                                             resources based on business policy, and
                                             E
                                           EN
         Databases
                                         OG                                            ISV Partner
                                    HETE
                                        R
                                                                                        Solutions            delivers tools to help end users manage
                                                                                                             their own identity information in the web
                                                                                                             based interface.
                                   Directories              IT Departments                               n   Integrates the heterogeneous identity
                                                                                                             infrastructure of the enterprise. FIM
    FIM empowers people, delivers agility and efficiency, and improves security and compliance.
User Experiences                                                                             n   Centralized management of multiple
                                 SharePoint-based IT management portal                                                                            credentials such as Microsoft and third-
                             End user self-service through Office and Windows                                                                     party certificate authorities.
                                  Integrated notifications and approvals                                                                      n   Password synchronization across systems,
                                                                                                                                                  which enables simplified sign-on.
       User                         Credentials                      Access                           Policy                                  n   Intuitive experiences built into the
    Management                     Management                      Management                       Management                                    Windows desktop logon so users can
                                                                                                                                                  reset their own passwords and provision
                                                                                                                                                  their own smart cards.
                                             Common Platform
                                                Web Service APIs
                                                                                                                                              User management
                                             Identity synchronization                                                                         FIM delivers tools for more efficient
                                                                                                                                              user provisioning and de-provisioning.
                                                                                                                                              These include:
FIM builds the management of users, credentials, access, and policy on a common platform and
delivers powerful user experiences to IT professionals, developers, and end users.                                                            n   Improved tools for user provisioning.
                                                                                                                                                  Automated user provisioning is managed
    provides a single place to manage                                      to enforce those rules that support                                    through a user interface rather than
    identities across a broad range of leading                             compliance automatically.                                              writing customized code.
    network operating systems, e-mail
                                                                                                                                                  Integrated provisioning of identities,
    and collaboration tools, databases,                                How Forefront Identity                                                 n

                                                                                                                                                  credentials, and resources. IT can use
    directories, and applications.                                     Manager Works                                                              FIM to create policies that
n   Maximizes existing investments. FIM                                FIM delivers solutions to manage user                                      seamlessly provision and de-provision
    makes it easier to manage identities                               accounts and access, password- and                                         the appropriate accounts, resources,
    across the existing infrastructure                                 certificate-based credentials such as                                      and credentials.
    including Active Directory® Domain                                 smart cards, and identity-based policies                               n   Self-service profile management for
    Services, Microsoft Exchange, and                                  across Windows and heterogeneous                                           users. IT can set policies to enable end
    Active Directory Certificate Services.                             environments.                                                              users to update profile information, such
n   Integrates with familiar developer tools                                                                                                      as their phone numbers, and to require
    such as Visual Studio and .NET to enable                           Policy management
                                                                                                                                                  approvals for and notifications of user-
    easier customization.                                              FIM establishes a framework for                                            generated changes. End users can use
                                                                       automating and integrating identity                                        these pages to search for other users as
Increases security and compliance                                      management so all enterprise systems                                       a whitepages application.
FIM improves security and compliance, with                             use the same set of policies. This is
management and auditing across identities,                             accomplished through:                                                  Group management
credentials, and resources.                                            n   Centralized authoring, enforcement,                                FIM group management helps
n   Secures the enterprise by integrating                                  and auditing of policies. IT administrators                        increase end-user productivity, frees IT
    identity, credential, and access manage-                               can manage policies that govern                                    from repetitive identity management
    ment across the organization. FIM                                      users and groups with menu-driven                                  tasks, and provides better security and
    enables IT to use a single, unified policy                             controls, thereby reducing the risk of                             compliance through:
    management system to manage users,                                     noncompliance.                                                     n   Self-service group management tools
    their access and resources, and their                              n   Extensible Windows Workflow                                            integrated into Office and SharePoint.
    credentials (including strong credentials).                            Foundation–based workflows. IT can use                                 These enable users to manage group
n   Implements a rich permission and                                       these to approve account creation and                                  membership requests using familiar
    delegation model to increase control and                               delegate tasks and other such actions,                                 applications and include enabling
    decrease compliance risk. For instance,                                and can easily extend them to deliver                                  requests offline.
    IT can delegate the creation of groups                                 complex custom workflows.                                          n   Automated dynamic updates of group
    and the management of distribution                                                                                                            and distribution groups. IT can use FIM
    group membership to end users while                                Credentials management
                                                                                                                                                  management tools to create policies that
    enforcing such policies as the life span                           FIM integrates the management of                                           keep groups and distribution groups up
    of the group.                                                      credentials for both administrators and                                    to date automatically.
n   Enables system audits to reduce the                                end users through:
                                                                                                                                              For more information about
    risk of noncompliance. Policy                                      n   Credential lifecycle management
                                                                                                                                              Forefront Identity Manager, visit
    management tools enable business                                       integrated with provisioning. IT
                                                                                                                                              www.microsoft.com/FIM
    owners and IT to audit business rules                                  professionals can manage the process
    and events processed by FIM, and                                       of provisioning accounts and credentials
                                                                           using a single tool.

©2009 Microsoft Corporation. All rights reserved. This data sheet is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
Microsoft, Active Directory, the Office logo,SharePoint, Visual Studio, Windows, and the Windows logo are either registered trademarks or trademarks of Microsoft Corporation in
the United States and/or other countries.

More Related Content

What's hot

IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit India
Leigh Williamson
 
Anything as a Service ?
Anything as a Service  ?Anything as a Service  ?
Anything as a Service ?
SaibalDC
 
Build Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business ApplicationBuild Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business Application
bgalusha
 
The 'SharePoint and...Story
The 'SharePoint and...StoryThe 'SharePoint and...Story
The 'SharePoint and...Story
Sentri
 
Communication Enabled Business Process- CEBP
Communication Enabled Business Process- CEBPCommunication Enabled Business Process- CEBP
Communication Enabled Business Process- CEBPVincent Perrin
 
Why portal jsf - Srest
Why portal jsf - SrestWhy portal jsf - Srest
Why portal jsf - Srest
Parvin Baishkiyar
 
Xoriant - Financial services expertise
Xoriant - Financial services expertiseXoriant - Financial services expertise
Xoriant - Financial services expertise
Xoriant Corporation
 
Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用George Ang
 
#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action
Mountaha
 
Unified Conferencing
Unified ConferencingUnified Conferencing
Unified ConferencingVideoguy
 
Contemporary Unified Communications and Contact Center: Better Together
Contemporary Unified Communications and Contact Center: Better TogetherContemporary Unified Communications and Contact Center: Better Together
Contemporary Unified Communications and Contact Center: Better Together
Avtex
 
Cisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & MoreCisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & More
ceriumnetworks
 
IBM Worklight - Introduction
IBM Worklight - IntroductionIBM Worklight - Introduction
IBM Worklight - Introduction
Maarga Systems
 
Navsoft Corporate Profile
Navsoft Corporate ProfileNavsoft Corporate Profile
Navsoft Corporate Profile
Navsoft
 
Microsoft Unified Communications - Retail Presentation
Microsoft Unified Communications - Retail PresentationMicrosoft Unified Communications - Retail Presentation
Microsoft Unified Communications - Retail PresentationMicrosoft Private Cloud
 
Presentación Collaboration Video Cablevisión Day 2010
Presentación Collaboration Video Cablevisión Day 2010Presentación Collaboration Video Cablevisión Day 2010
Presentación Collaboration Video Cablevisión Day 2010Logicalis Latam
 
Video. The new dialtone for business communications
Video. The new dialtone for business communicationsVideo. The new dialtone for business communications
Video. The new dialtone for business communicationsschinarro
 
Sybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel BilgilendirmeSybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase Türkiye
 
Designing Enterprise Mobile Applications: Critical Success Factors
Designing Enterprise Mobile Applications: Critical Success FactorsDesigning Enterprise Mobile Applications: Critical Success Factors
Designing Enterprise Mobile Applications: Critical Success FactorsPerficient, Inc.
 

What's hot (19)

IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit India
 
Anything as a Service ?
Anything as a Service  ?Anything as a Service  ?
Anything as a Service ?
 
Build Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business ApplicationBuild Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business Application
 
The 'SharePoint and...Story
The 'SharePoint and...StoryThe 'SharePoint and...Story
The 'SharePoint and...Story
 
Communication Enabled Business Process- CEBP
Communication Enabled Business Process- CEBPCommunication Enabled Business Process- CEBP
Communication Enabled Business Process- CEBP
 
Why portal jsf - Srest
Why portal jsf - SrestWhy portal jsf - Srest
Why portal jsf - Srest
 
Xoriant - Financial services expertise
Xoriant - Financial services expertiseXoriant - Financial services expertise
Xoriant - Financial services expertise
 
Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用
 
#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action
 
Unified Conferencing
Unified ConferencingUnified Conferencing
Unified Conferencing
 
Contemporary Unified Communications and Contact Center: Better Together
Contemporary Unified Communications and Contact Center: Better TogetherContemporary Unified Communications and Contact Center: Better Together
Contemporary Unified Communications and Contact Center: Better Together
 
Cisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & MoreCisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & More
 
IBM Worklight - Introduction
IBM Worklight - IntroductionIBM Worklight - Introduction
IBM Worklight - Introduction
 
Navsoft Corporate Profile
Navsoft Corporate ProfileNavsoft Corporate Profile
Navsoft Corporate Profile
 
Microsoft Unified Communications - Retail Presentation
Microsoft Unified Communications - Retail PresentationMicrosoft Unified Communications - Retail Presentation
Microsoft Unified Communications - Retail Presentation
 
Presentación Collaboration Video Cablevisión Day 2010
Presentación Collaboration Video Cablevisión Day 2010Presentación Collaboration Video Cablevisión Day 2010
Presentación Collaboration Video Cablevisión Day 2010
 
Video. The new dialtone for business communications
Video. The new dialtone for business communicationsVideo. The new dialtone for business communications
Video. The new dialtone for business communications
 
Sybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel BilgilendirmeSybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
 
Designing Enterprise Mobile Applications: Critical Success Factors
Designing Enterprise Mobile Applications: Critical Success FactorsDesigning Enterprise Mobile Applications: Critical Success Factors
Designing Enterprise Mobile Applications: Critical Success Factors
 

Similar to Microsoft Forefront - Identity Manager 2010 Datasheet

Microsoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Private Cloud
 
ServicePilot ISM Enterprise Datasheet [EN]
ServicePilot ISM Enterprise Datasheet [EN]ServicePilot ISM Enterprise Datasheet [EN]
ServicePilot ISM Enterprise Datasheet [EN]
ServicePilot
 
Managing API Security in SaaS and Cloud
Managing API Security in SaaS and CloudManaging API Security in SaaS and Cloud
Managing API Security in SaaS and Cloud
CA API Management
 
Managing API Security in SaaS and Cloud
Managing API Security in SaaS and CloudManaging API Security in SaaS and Cloud
Managing API Security in SaaS and Cloud
CA API Management
 
VisionIT from Partners in IT
VisionIT from Partners in ITVisionIT from Partners in IT
VisionIT from Partners in IT
paulcash
 
Vision IT Monitoring
Vision IT MonitoringVision IT Monitoring
Vision IT Monitoring
PaulJenks
 
Ergo - IT Infrastructure Overview Brochure
Ergo - IT Infrastructure Overview BrochureErgo - IT Infrastructure Overview Brochure
Ergo - IT Infrastructure Overview Brochureffurlong
 
Government sector smart_suite_success_story
Government sector smart_suite_success_storyGovernment sector smart_suite_success_story
Government sector smart_suite_success_storyIITSW Company
 
Enterprise Content Management and Microsoft Office SharePoint Server 2007 - U...
Enterprise Content Management and Microsoft Office SharePoint Server 2007 - U...Enterprise Content Management and Microsoft Office SharePoint Server 2007 - U...
Enterprise Content Management and Microsoft Office SharePoint Server 2007 - U...
Dave Healey
 
Ds n gencim_knowledgebase_q109na
Ds n gencim_knowledgebase_q109naDs n gencim_knowledgebase_q109na
Ds n gencim_knowledgebase_q109nanGenera
 
What is behind the cloud
What is behind the cloudWhat is behind the cloud
What is behind the cloud
Joseph Remesar
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
Enterprise Content Management And Microsoft Office Sharepoint Server 2007 Unl...
Enterprise Content Management And Microsoft Office Sharepoint Server 2007 Unl...Enterprise Content Management And Microsoft Office Sharepoint Server 2007 Unl...
Enterprise Content Management And Microsoft Office Sharepoint Server 2007 Unl...jamesbyrne
 
VisionIT - SaaS IT Infrastructure Monitoring
VisionIT - SaaS IT Infrastructure MonitoringVisionIT - SaaS IT Infrastructure Monitoring
VisionIT - SaaS IT Infrastructure Monitoring
Partners in IT
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
Brandon Dunlap
 
Connected Office 3.0
Connected Office 3.0Connected Office 3.0
Connected Office 3.0
ddcatfan1
 
9sept2009 fujitsu
9sept2009 fujitsu9sept2009 fujitsu
9sept2009 fujitsuAgora Group
 
Case Study ING - ITpreneurs & CompTIA
Case Study ING - ITpreneurs & CompTIACase Study ING - ITpreneurs & CompTIA
Case Study ING - ITpreneurs & CompTIA
RyeTerseGramp
 
Leveraging SharePoint for Extranets
Leveraging SharePoint for ExtranetsLeveraging SharePoint for Extranets
Leveraging SharePoint for ExtranetsAvtex
 

Similar to Microsoft Forefront - Identity Manager 2010 Datasheet (20)

Microsoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management Whitepaper
 
ServicePilot ISM Enterprise Datasheet [EN]
ServicePilot ISM Enterprise Datasheet [EN]ServicePilot ISM Enterprise Datasheet [EN]
ServicePilot ISM Enterprise Datasheet [EN]
 
Managing API Security in SaaS and Cloud
Managing API Security in SaaS and CloudManaging API Security in SaaS and Cloud
Managing API Security in SaaS and Cloud
 
Managing API Security in SaaS and Cloud
Managing API Security in SaaS and CloudManaging API Security in SaaS and Cloud
Managing API Security in SaaS and Cloud
 
VisionIT from Partners in IT
VisionIT from Partners in ITVisionIT from Partners in IT
VisionIT from Partners in IT
 
Vision IT Monitoring
Vision IT MonitoringVision IT Monitoring
Vision IT Monitoring
 
Ergo - IT Infrastructure Overview Brochure
Ergo - IT Infrastructure Overview BrochureErgo - IT Infrastructure Overview Brochure
Ergo - IT Infrastructure Overview Brochure
 
Government sector smart_suite_success_story
Government sector smart_suite_success_storyGovernment sector smart_suite_success_story
Government sector smart_suite_success_story
 
Enterprise Content Management and Microsoft Office SharePoint Server 2007 - U...
Enterprise Content Management and Microsoft Office SharePoint Server 2007 - U...Enterprise Content Management and Microsoft Office SharePoint Server 2007 - U...
Enterprise Content Management and Microsoft Office SharePoint Server 2007 - U...
 
Ds n gencim_knowledgebase_q109na
Ds n gencim_knowledgebase_q109naDs n gencim_knowledgebase_q109na
Ds n gencim_knowledgebase_q109na
 
What is behind the cloud
What is behind the cloudWhat is behind the cloud
What is behind the cloud
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
Enterprise Content Management And Microsoft Office Sharepoint Server 2007 Unl...
Enterprise Content Management And Microsoft Office Sharepoint Server 2007 Unl...Enterprise Content Management And Microsoft Office Sharepoint Server 2007 Unl...
Enterprise Content Management And Microsoft Office Sharepoint Server 2007 Unl...
 
Getting cloud computing right
Getting cloud computing rightGetting cloud computing right
Getting cloud computing right
 
VisionIT - SaaS IT Infrastructure Monitoring
VisionIT - SaaS IT Infrastructure MonitoringVisionIT - SaaS IT Infrastructure Monitoring
VisionIT - SaaS IT Infrastructure Monitoring
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
Connected Office 3.0
Connected Office 3.0Connected Office 3.0
Connected Office 3.0
 
9sept2009 fujitsu
9sept2009 fujitsu9sept2009 fujitsu
9sept2009 fujitsu
 
Case Study ING - ITpreneurs & CompTIA
Case Study ING - ITpreneurs & CompTIACase Study ING - ITpreneurs & CompTIA
Case Study ING - ITpreneurs & CompTIA
 
Leveraging SharePoint for Extranets
Leveraging SharePoint for ExtranetsLeveraging SharePoint for Extranets
Leveraging SharePoint for Extranets
 

More from Microsoft Private Cloud

Hyper-V improves appliance manufacturer’s productivity
Hyper-V improves appliance manufacturer’s productivityHyper-V improves appliance manufacturer’s productivity
Hyper-V improves appliance manufacturer’s productivity
Microsoft Private Cloud
 
AcXess saves U.S.$5 million in hardware with Hyper V
AcXess saves U.S.$5 million in hardware with Hyper VAcXess saves U.S.$5 million in hardware with Hyper V
AcXess saves U.S.$5 million in hardware with Hyper V
Microsoft Private Cloud
 
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data QuestMicrosoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data QuestMicrosoft Private Cloud
 
Cloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the CloudCloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the Cloud
Microsoft Private Cloud
 
Economics of the Cloud - A Report Based On CFO Survey
Economics of the Cloud - A Report Based On CFO SurveyEconomics of the Cloud - A Report Based On CFO Survey
Economics of the Cloud - A Report Based On CFO SurveyMicrosoft Private Cloud
 
Assess The Economics Of The Cloud By Using In Depth Modeling
Assess The Economics Of The Cloud By Using In Depth ModelingAssess The Economics Of The Cloud By Using In Depth Modeling
Assess The Economics Of The Cloud By Using In Depth ModelingMicrosoft Private Cloud
 
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case StudyTicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case StudyMicrosoft Private Cloud
 
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...Microsoft Private Cloud
 
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case StudyGodiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case StudyMicrosoft Private Cloud
 
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...Microsoft Private Cloud
 
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...Microsoft Private Cloud
 
Simplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Simplify Your IT Management with Microsoft SharePoint Online: WhitepaperSimplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Simplify Your IT Management with Microsoft SharePoint Online: WhitepaperMicrosoft Private Cloud
 
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...Microsoft Private Cloud
 
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...Microsoft Private Cloud
 
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: WhitepaperDeployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: WhitepaperMicrosoft Private Cloud
 
Communicate Easily with Others in Different Locations with Microsoft Office C...
Communicate Easily with Others in Different Locations with Microsoft Office C...Communicate Easily with Others in Different Locations with Microsoft Office C...
Communicate Easily with Others in Different Locations with Microsoft Office C...Microsoft Private Cloud
 
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...Microsoft Private Cloud
 
Cloud Based Communications Solutions from Microsoft
Cloud Based Communications Solutions from MicrosoftCloud Based Communications Solutions from Microsoft
Cloud Based Communications Solutions from MicrosoftMicrosoft Private Cloud
 
Reduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteReduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteMicrosoft Private Cloud
 

More from Microsoft Private Cloud (20)

Hyper-V improves appliance manufacturer’s productivity
Hyper-V improves appliance manufacturer’s productivityHyper-V improves appliance manufacturer’s productivity
Hyper-V improves appliance manufacturer’s productivity
 
AcXess saves U.S.$5 million in hardware with Hyper V
AcXess saves U.S.$5 million in hardware with Hyper VAcXess saves U.S.$5 million in hardware with Hyper V
AcXess saves U.S.$5 million in hardware with Hyper V
 
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data QuestMicrosoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
 
Cloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the CloudCloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the Cloud
 
Economics of the Cloud - A Report Based On CFO Survey
Economics of the Cloud - A Report Based On CFO SurveyEconomics of the Cloud - A Report Based On CFO Survey
Economics of the Cloud - A Report Based On CFO Survey
 
Assess The Economics Of The Cloud By Using In Depth Modeling
Assess The Economics Of The Cloud By Using In Depth ModelingAssess The Economics Of The Cloud By Using In Depth Modeling
Assess The Economics Of The Cloud By Using In Depth Modeling
 
A Guide To Finding Your Cloud Power
A Guide To Finding Your Cloud PowerA Guide To Finding Your Cloud Power
A Guide To Finding Your Cloud Power
 
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case StudyTicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
 
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
 
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case StudyGodiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
 
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
 
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
 
Simplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Simplify Your IT Management with Microsoft SharePoint Online: WhitepaperSimplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Simplify Your IT Management with Microsoft SharePoint Online: Whitepaper
 
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
 
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
 
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: WhitepaperDeployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
 
Communicate Easily with Others in Different Locations with Microsoft Office C...
Communicate Easily with Others in Different Locations with Microsoft Office C...Communicate Easily with Others in Different Locations with Microsoft Office C...
Communicate Easily with Others in Different Locations with Microsoft Office C...
 
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
 
Cloud Based Communications Solutions from Microsoft
Cloud Based Communications Solutions from MicrosoftCloud Based Communications Solutions from Microsoft
Cloud Based Communications Solutions from Microsoft
 
Reduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteReduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online Suite
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

Microsoft Forefront - Identity Manager 2010 Datasheet

  • 1. Integrated identity management delivering powerful self-service capabilities for end users and enhanced administrative tools and automation for IT professionals Microsoft® Forefront™ Business Challenges Forefront Identity Manager Identity Manager 2010 Benefits offers a comprehensive Organizations today are confronted solution for managing with a number of identity and access Empowers people identities, credentials, and challenges that FIM can help address. FIM puts the right tools in the hands of identity-based access policies Chief among these: end users, IT professionals, and developers across heterogeneous n The burden of complexity on IT, to increase their productivity and to lower environments. FIM empowers which must manage identities across help desk and other costs. users with self service heterogeneous systems. n Increases end-user productivity through password reset and embeds n High help-desk costs associated with self-help tools integrated into Office and self-help tools in Office so password resets and smart Windows®. Without calling the help desk, users can manage routine card deployment. users can reset a password or smart card aspects of identity and n Loss of end-user productivity because PIN, create an e-mail distribution group, access, gives IT professionals users cannot manage the routine aspects or add co-workers to a group. FIM portal rich administrative tools of their own identity and access. also provides users with capabilities such as update their own profile, search for and enhanced automation, n Lengthy development time for identity co-workers. and delivers .NET and Web management customization because Services-based extensibility existing developer interfaces require n Helps IT professionals manage identities for developers. specialized knowledge. more efficiently through a SharePoint®– based administrative console. IT can use n Security gaps and risk to the business the menu-driven user interface of the due to noncompliance with internal and console to create policies and workflows external regulations. that govern account management and access throughout the enterprise. n Increases developer productivity through extensibility. Developers can access Web Services–based APIs and .NET to Self-Service Integration customize FIM functionality through the FIM Portal D END USER INTE Windows Log On familiar Microsoft Visual Studio® and AN RFA IT CE .NET development environments. S Delivers agility and efficiency Through automation, self-service, and rich extensibility, FIM reduces the CTIVITY Empowers people high costs and risk often associated with identity management. EX LOB Applications Delivers agility & efficiency TEN NNE Improves security & Custom n Reduces costs through automation compliance SIB CO and self-service. FIM automates the ILI US management of users, groups, and other T Y O resources based on business policy, and E EN Databases OG ISV Partner HETE R Solutions delivers tools to help end users manage their own identity information in the web based interface. Directories IT Departments n Integrates the heterogeneous identity infrastructure of the enterprise. FIM FIM empowers people, delivers agility and efficiency, and improves security and compliance.
  • 2. User Experiences n Centralized management of multiple SharePoint-based IT management portal credentials such as Microsoft and third- End user self-service through Office and Windows party certificate authorities. Integrated notifications and approvals n Password synchronization across systems, which enables simplified sign-on. User Credentials Access Policy n Intuitive experiences built into the Management Management Management Management Windows desktop logon so users can reset their own passwords and provision their own smart cards. Common Platform Web Service APIs User management Identity synchronization FIM delivers tools for more efficient user provisioning and de-provisioning. These include: FIM builds the management of users, credentials, access, and policy on a common platform and delivers powerful user experiences to IT professionals, developers, and end users. n Improved tools for user provisioning. Automated user provisioning is managed provides a single place to manage to enforce those rules that support through a user interface rather than identities across a broad range of leading compliance automatically. writing customized code. network operating systems, e-mail Integrated provisioning of identities, and collaboration tools, databases, How Forefront Identity n credentials, and resources. IT can use directories, and applications. Manager Works FIM to create policies that n Maximizes existing investments. FIM FIM delivers solutions to manage user seamlessly provision and de-provision makes it easier to manage identities accounts and access, password- and the appropriate accounts, resources, across the existing infrastructure certificate-based credentials such as and credentials. including Active Directory® Domain smart cards, and identity-based policies n Self-service profile management for Services, Microsoft Exchange, and across Windows and heterogeneous users. IT can set policies to enable end Active Directory Certificate Services. environments. users to update profile information, such n Integrates with familiar developer tools as their phone numbers, and to require such as Visual Studio and .NET to enable Policy management approvals for and notifications of user- easier customization. FIM establishes a framework for generated changes. End users can use automating and integrating identity these pages to search for other users as Increases security and compliance management so all enterprise systems a whitepages application. FIM improves security and compliance, with use the same set of policies. This is management and auditing across identities, accomplished through: Group management credentials, and resources. n Centralized authoring, enforcement, FIM group management helps n Secures the enterprise by integrating and auditing of policies. IT administrators increase end-user productivity, frees IT identity, credential, and access manage- can manage policies that govern from repetitive identity management ment across the organization. FIM users and groups with menu-driven tasks, and provides better security and enables IT to use a single, unified policy controls, thereby reducing the risk of compliance through: management system to manage users, noncompliance. n Self-service group management tools their access and resources, and their n Extensible Windows Workflow integrated into Office and SharePoint. credentials (including strong credentials). Foundation–based workflows. IT can use These enable users to manage group n Implements a rich permission and these to approve account creation and membership requests using familiar delegation model to increase control and delegate tasks and other such actions, applications and include enabling decrease compliance risk. For instance, and can easily extend them to deliver requests offline. IT can delegate the creation of groups complex custom workflows. n Automated dynamic updates of group and the management of distribution and distribution groups. IT can use FIM group membership to end users while Credentials management management tools to create policies that enforcing such policies as the life span FIM integrates the management of keep groups and distribution groups up of the group. credentials for both administrators and to date automatically. n Enables system audits to reduce the end users through: For more information about risk of noncompliance. Policy n Credential lifecycle management Forefront Identity Manager, visit management tools enable business integrated with provisioning. IT www.microsoft.com/FIM owners and IT to audit business rules professionals can manage the process and events processed by FIM, and of provisioning accounts and credentials using a single tool. ©2009 Microsoft Corporation. All rights reserved. This data sheet is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Microsoft, Active Directory, the Office logo,SharePoint, Visual Studio, Windows, and the Windows logo are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.