Forefront Identity Manager (formerly ILM “2”) changes the present state of identity management by providing powerful end-user self-service capabilities. IT professionals are also provided additional tools to solve everyday tasks such as empowering administration and creating workflows for common identity management tasks. Added to that, Forefront Identity Manager is built on a .NET and WS-* based foundation for software programmers to build more customized and extensible solutions. End-users can easily self-serve tasks such as group and distribution list management with self-help tools integrated into a Share Point-based console as well as directly in Microsoft Office Outlook.
It provides IT professionals with the applications they need to manage identities through a SharePoint-based policy and workflow management console. Developers access extensibility features through extensive public APIs. Integrates enterprises' heterogeneous infrastructure, includes line of business applications, directories, and databases. Allows management of heterogeneous strong authentication systems, such as third-party certificate authorities. Forefront Identity Manager helps organizations integrate their policies across the organization and helps them secure the enterprise. Integrated management tools allow organizations to beneficiate from the policies of strong authentication.
It provides IT professionals with the applications they need to manage identities through a SharePoint-based policy and workflow management console. Developers access extensibility features through extensive public APIs. Integrates enterprises' heterogeneous infrastructure, includes line of business applications, directories, and databases. Allows management of heterogeneous strong authentication systems, such as third-party certificate authorities. Forefront Identity Manager helps organizations integrate their policies across the organization and helps them secure the enterprise. Integrated management tools allow organizations to beneficiate from the policies of strong authentication.
No comments:
Post a Comment