I thought the course was excellent, made very interesting by the enthusiasm of the instructor and his examples. The labs provided a good challenge by helping me to feel more confident going back to support our MIM deployment.
Campbell, Windows Engineer, UK, 2019
Online Self-Paced Course
Learn in your own time with tutor support. Start any time!
This course is available: live instructor-led in the classroom or via Teams/Skype | online, self-paced | private training in the classroom or via Teams/Skype
Module 1: MIM reminder
We start with a tour of the features of MIM that were covered in the Foundation course, pointing out those areas which this course will further develop. This is an opportunity to clear up any misunderstandings before launching into a lot of new information. This module gives a (reminder) overview of the other capabilities of MIM (Role Based Access Control and Privileged Access Management).
Module 2: Portal configuration
We look at the interface configuration, including look and feel and navigation. The portal schema model is also considered: resources, attributes, bindings and validations; use of XPath and search scopes; usage keywords and localization; how to extend the schema.
Module 3: Understanding synchronization
We cover metaverse schema extension, and synchronization in depth. We explore the whole process, including holograms and how to troubleshoot synchronization errors. Synchronization rules are mapped to the classic rules, identifying where to use each type, and where extensions are required.
Module 4: More complex workflows and MPRs
In this module we examine the MIM Service and application database. This covers more complex workflows using functions and parameters, and temporal (time-based) MPRs for expiration, notification and delayed actions. We import and use a third party Windows Workflow Foundation workflow, and use it to generate MIM workflows.
Module 5: Classic rule extensions
This module introduces (coded) extensions of classic management agent configuration, including coded provisioning, attribute flow, and deprovisioning. Topics include DLL extension architecture, metaverse and management agent DLL concepts, and creating and debugging extensions. Suggestions are made for effective management and best practices.
Module 6: More about management agents
In this module we look at some additional features of the management agents, and look at management agent types not yet covered. Specifically we look at file-based management agents, and how delta imports can be applied to database type management agents (with SQL Server being the exemplar). We provide some notes on the use of the other types of management agent that are not explicitly covered in the course, and lastly we give an overview of the different ways in which MAs can be extended (but this is a topic that cannot be covered in any detail in this course).
Module 7: Architecture installation and deployment
This module covers installation, but also considers likely production topologies, how to scale it, and other considerations. Installation of the password web sites, and reporting functions are also covered.
Module 8: Reporting in MIM
This module covers the out-of-the-box reporting available with MIM. and looks at a third-party reporting solution, namely, Software IDM’s Sync Panel. Starting with simple usage of reports, it then covers how to manage the flow of data from MIM to the reporting data warehouse (DW). It covers the different data structure in the DW, and how this maps to MIM’s schema. Sync Panel adds more reporting options and other useful features to MIM. We investigate an installation of of Sync Panel and identify what it adds to a MIM solution.
Module 9: Operations, troubleshooting and metaverse reporting
This module looks at all the sources of information that can help in operating and troubleshooting MIM. It covers synchronization preview, and analyzing requests in the MIM Service. It covers the use of PowerShell cmdlets for extracting and migrating configuration data – including pitfalls and essential workarounds. It also covers how to report on the metaverse (this is not supported by Microsoft).
Module 10: More synchronization
The final module covers some advanced synchronization techniques. We cover cases where there may be more than one account, in a given external system, relating to one person. We also cover approaches to automated group creation and management. The labs in this module are presented as optional – partly this is because they are quite involved and “expert” in nature, and partly to give us some flexibility on the timing of the course (which can vary considerably depending on the amount of class discussion, and so on).
This course is intended for systems engineers and architects (and it is also useful for developers) who need to gain a deeper understanding of how MIM can be implemented. They will usually have attended the FIM or MIM Foundation course – but in any case must have gained a similar level of knowledge.
Excellent experience! Very informative and deep course! I am full of useful information and my neurons and synapses are dancing foxtrot now 😀
Gediminas, Systems Engineer, Lithuania MIM Advanced - online, self-paced, 2020
The course was very enriching and the instructor was excellent. Private training worked well as our team members have different opinions.
Josue, Identity Security Specialist, Costa Rica MIM Advanced - private training via Teams/Skype, 2020
Paul [the instructor] clearly knows his MIM, and he makes the subject entertaining enough so as not to lose attention. Private training seems like a better experience asyou can have open discussions about your current implementation or plans.
Alex, Team Lead, Canada MIM Advanced - private training via Teams/Skype, 2020