January 3, 2011 at 9:29 PM
I’m proud to announce I’m now a Microsoft Certified Trainer and this spring I’ll hold the 4 day Implementing Forefront Identity Manager 2010course at Cornerstonein Stockholm, Gothenburg and Malmö (in Swedish). If you’re interested to attend the course go ahead and visit Cornerstone and don’t be confused Cornerstone calls the course T207.
These are the preliminary course dates:
- 22-25 February in Malmö
- 15-18 March in Stockholm
- 5-8 April in Gothenburg
- 3-6 May in Stockholm
December 9, 2010 at 2:33 PM
A little bird whispered in my ear that SQL Server 2008 R2 is now supported for FIM 2010 from yesterday, still no update of the Hardware and Software Requirements and nothing about an update for making the installer work but hopefully we’ll hear about it soon.
December 5, 2010 at 11:47 AM
I know, I haven’t been blogging as much as I should but a lot of work and a whole bunch of interesting development projects have been taking up my time but I’m very pleased I can finally report that one of these projects have reached it’s first release to CodePlex.
FIM is of course the ultimate place for attributes to issue as claims using ADFS 2.0 since you typically store attributes from all different kinds of connected directories there. Not only will you be able to issue standard attributes - you can do lookups for groups, sets or roles and publish these as claims as well, perfect for authorization scenarios.
The footprint on ADFS 2.0 is minimal and it doesn't require more than the usual attribute store configuration. The attribute store also comes with a command-line test client that allows you to get the communication with FIM correct and also enables you to run custom queries against FIM. The test client is pretty much a command-line version of the FIM Query Tool once published by Joe Zamora from Ensynch except it uses the attribute store under the hood that also can be attached directly to ADFS 2.0.
It's currently in Beta so please try it out and report issues to the project page on CodePlex so that I can make it better!
The ADFS 2.0 configuration of the attribute store.
Example output from the Test client.
September 4, 2010 at 8:31 AM
Carol(MissMiis) has created a really nice activity for executing PowerShell scripts, both local and remote and it opens up for all kinds of possibilities! Check it out!
April 1, 2010 at 6:38 PM
Dear Henrik Nilsson,
Congratulations! We are pleased to present you with the 2010 Microsoft® MVP Award! This award is given to exceptional technical community leaders who actively share their high quality, real world expertise with others. We appreciate your outstanding contributions in Identity Lifecycle Manager technical communities during the past year.
I hoped it would have happened in January but no email showed up and I had totally given up the idea I would be awarded especially since I have had way too much work lately and haven’t had the time to keep myself active in the community.
I became really surprised today when I found the email from Microsoft… in my junk email folder! :-)
March 2, 2010 at 3:41 PM
January 7, 2010 at 12:45 AM
I’m currently working with Markus Vilcinskas on a couple of FIM Experts articles on how to detect non-authoritative accounts. Today we published the first two parts were the second part also contains an in depth description on how object state detection works. Enjoy!
December 18, 2009 at 7:11 PM
- IDP initiated communication
- Single logout
- Artifact resolution protocol
- And a lot more…
See the announcement here:
December 2, 2009 at 6:57 PM
I turns out there’s a lot of things that needs to be in place before this is made possible…
Usage keywords are required for letting non-admin users see portal design elements like navigation bar and home page resources but also for letting them being able to use search scopes. The keyword for letting non-admin users take part of these objects is BasicUI…
1. Under Administration and Home Page Resources select the “Manage my SG’s” and add the keyword BasicUI as usage keyword.
2. Go back to Administration and select Navigation Bar Resources. Select the “My SG’s” navigation bar resource and add the BasicUI keyword to this one as well.
3. Go back to Administration again and select Search Scopes. Add BasicUI as Usage keyword to the “My Security Groups” Search Scope
There is two MPR’s that allows for group owners to manage their groups. Both of these are disabled by default.
4. Go back to Administration and in to Management Policy Rules. Open and enable these two MPR’s:
- Security group management: Owners can read selected attributes of group resources
- Security group management: Owners can update and delete groups they own
The usage keyword stuff is poorly documented but I hope this will be better…