Awesome class! Each course just gets better and better on how to use MIM for the business. Paul, the instructor, knows his stuff. And he shares his knowledge and really helps us understand the inner workings of MIM. Best in the business for this type of training. This was an absolutely excellent course! Thanks so much!
Who is our Microsoft Identity Manager Expert Course for?
This course is for developers, systems engineers and technical architects who:
Wish to become experts in this specialist technology
Have already attended the MIM Advanced course or be at that level, for example, you will already have significant practical MIM (or FIM) experience and knowledge
Wish to dive deeply into the features covered in the advanced course, to learn further concepts and specialist configuration options that a MIM expert needs to know!
Students must be prepared to read some code. Where code is used, the emphasis is on the need for the code and how it fits into the overall architecture – and we provide the code, rather than expecting you to write it. Most technical consultants take the coding aspects of this course in their stride.
This course is available: live instructor-led via Teams | private training in the classroom or via Teams
Module 1: Rules extensions
While much can be done through declarative Portal Sync Rules, the greatest flexibility and scalability is obtained by using Sync Server Rules Extensions. This is the biggest module and is a review of rules extensions, when they should be used, and for what. We introduce many examples, and suggest best practices based on our real-world experience of applying MIM and its predecessors in many and varied environments.
Module 2: Rule extensions technique
This module builds on module 1, taking what you have learnt about rules extension and applying it in a number of useful techniques, including the handling of multiple connector space objects (in a single MA), managing multiple metaverse extensions (making it easy to manage provisioning rules across many target systems), and data validation (making sure only clean data reaches the metaverse. Debugging of code is also covered.
Module 3: Some portal considerations
In our A621 course we make use of Sets and Management Policy Rules (MPRs). They are, of course, fundamental to the security of the Portal, as well as any event driven portal activity, and potentially they can control synchronization too. Here we go into them more deeply, exploring XPath, identifying limitations and workarounds, and suggesting some best practices. We discuss naming conventions. We make use of two OCG tools, one for editing RCDCs and the other for safely migrating portal configuration.
Module 4: Approaches to synchronization
During our MIM Foundation (A620) and Advanced (A621) courses, and even this one, we spend a lot of time on synchronization – and quite rightly. In this module we bottom out the arguments about where to use portal sync rules and where to use classic rules. We also suggest a hybrid approach. Finally we provide an overview of Azure AD Connect, which is a special version of the sync engine that is used to connect AD with Azure.
Module 5: Workflows
We used workflows in the A621 course, but here we go through the programming model for Windows Workflow Foundation activities and build a representative custom activity – giving you a template for your future use.
Module 6: More reporting
We expand on the A621 coverage of reporting, showing how to extend the reporting schema, and how to write your own simple reports. We also make use of another OCG tool to report on the MIM configuration.
Module 7: Extending MAs
Out-of-the-box, MIM provides many Management Agents that allow you to connect to many systems, but almost all real-world cases involve connecting to additional systems. We explore the techniques available for extending MAs, with the major part of the module covering the ECMA2 extensible MA, providing a lot of “what it can do” and some examples for those interested in the actual code.
This course is intended for developers, but also for those systems engineers and architects who are prepared to read some code (where code is used, the emphasis is on the need for the code and how it fits into the overall architecture – and we provide the code, rather than expecting you to write it).
We assume that participants will have attended our MIM Advanced course or have reached an equivilent level.