Blog

Amazon–FIM Best Practices Volume 1

Apparently one of the Amazon marketplace sellers has decided to list my book on Amazon. So I am excited that it can now be found on Amazon, but it should be noted that Old Shingled House has marked it up to $49.95 a 99.5% markup. Old Shingled House is buying them through Lulu at the regular rate of $25.00. If you buy it through Amazon or through Lulu, I still get my normal cut, the question is how much you pay.

Continue reading

Buy FIM Vol 1 and Get free ground shipping through Dec 12th

From LULU: Enter coupon code HOLIDAY305 to receive free ground shipping. Shipping address must be within the United States. The maximum savings for this offer is $45. Sorry, but this offer is only valid in US dollars and cannot be applied to previous orders. You can only use this code once per account, and unfortunately you can’t use this coupon in combination with other coupon codes. This great offer expires on December 12, 2010 at 11:59 PM PST, so don’t miss out!

Continue reading

Law of Unintended Consequences

Any news on certification paths for IDM? Derek A. Hanson - Dec 6, 2010Any news on certification paths for IDM? Hey Derek, No news yet. Just my own speculation but I would expect to see an exam covering several Microsoft Identity Technologies emerging sometime next year.

Continue reading

Law of Unintended Consequences

In the process of setting up to teach 50382A - Implementing Forefront Identity Manager 2010 in Phoenix, AZ (Feb 8-11 and May 23 – May 26 – registration info to follow in a subsequent post) and looking at other courses in the Microsoft Courseware library I have noticed an interesting trend – most courses have lots of very bland reviews like this: “Good Course” “Good one” “Good content and best practices”

Continue reading

Get 25% off of FIM Best Practices Volume 1 Today only

Valid today only through 11:59 PM (EST) and only valid in the US, Lulu is offering 25% off. So you can order FIM Best Practices at 25% off. Enter the following promo code at Checkout: CYBER305 Click here to look at the book: http://www.lulu.com/spotlight/david_lundell http://feeds.feedburner.com/IdentityLifecycleManagerilmBestPractices

Continue reading

Webinar is available for viewing

The webinar on Friday went well. Here it is available for viewing at your pleasure. http://feeds.feedburner.com/IdentityLifecycleManagerilmBestPractices

Continue reading

Case Study: Real World organizations simplify Identity Management

Tomorrow morning at 8 AM PST I will be participating as a speaker in a webinar with Jonathan Sander from Quest. http://www.brighttalk.com/webcast/22703 Successful identity and access management means different things to different organizations, but in almost every case, it requires complex, time-consuming, and expensive solutions. However, an ever-growing number of organizations have found a new way to achieve their identity and access management objectives simply, inexpensively, and powerfully. In this webcast, identity and access management experts will discuss how organizations like yours have discovered and are implementing a simplified approach to identity and access management.

Continue reading

TEC 2010 Europe – Sweet German Chocolate!

Sounds like a great conference. The Berliners will… johnkaiser - Nov 2, 2010Sounds like a great conference. The Berliners will want you back soon with Volume2!

Continue reading

TEC 2010 Europe – Sweet German Chocolate!

Overall TEC 2010 Europe in Dusseldorf Germany was pretty cool. I enjoyed the speakers reception on Sunday night and got to meet some folks from the SharePoint side some of whom are even interested in FIM and one of them bought my book! For the first time I was able to bring my wife along to TEC! We enjoyed some good time in Dusseldorf including seeing Schloss (Palace) Benrather. Monday we started off with a keynote from Uday Hegde and Mark Wahl on the future of Directory and Identity Technologies.

Continue reading

Details of Errata

Here is what the text on page 183 should say (the italicized items are the new or changed bits of text) Unattended Install of the FIM Client This is the component that you will perhaps most desperately see the need for unattended install. Use the following table to help you plan your install as well as to understand the relationship between the UI parameters, the Unattended parameters and where these items are persisted.

Continue reading