Summary

In this chapter, we discussed why privileged access management is important, its components, and how it works. We gave you the component requirements and walked you through installing the module and verifying its functionality by demonstrating how an end user would perform a request. Considerations, installation of the sample, the custom PAM portal, and setting up multi-factor authentication was also discussed. Did we miss anything? You bet! Explore the official TechNet documents for PAM at http://bit.ly/MIMPAMTechNet.

In the next chapter, we will cover how MIM can help your organization save end user time, money, and frustration by setting up self-service password reset and password synchronization. Even though password management such ...

Get Microsoft Identity Manager 2016 Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.