{"id":1284,"date":"2008-11-13T10:29:34","date_gmt":"2008-11-13T10:29:34","guid":{"rendered":"http:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm"},"modified":"2008-11-13T10:29:34","modified_gmt":"2008-11-13T10:29:34","slug":"identity-and-security-developments-at-microsoft","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm","title":{"rendered":"Identity and security developments at Microsoft"},"content":{"rendered":"<p>In amongst all the exciting new product announcements for new Windows releases and cloud computing platforms it&#8217;s all too easy to miss out on some of the core infrastructure enhancements that Microsoft is making. Last week I got the chance to catch up with Joel Sider from Microsoft&#8217;s Identity and Security group &#8211; a new organisation at Microsoft formed to address the issues of identity and security (which are really two sides of the same coin) and which, until recently have been treated as individual point solutions.<\/p>\n<p>Joel explained to me that, with a single business group and a single engineering group, Microsoft is able to focus on the complete product stack, from System Center and Identity Lifecycle Manager (ILM &#8211; formerly <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/04\/managing-identity-with-microsoft.htm\">MIIS<\/a>), through Forefront security to the Windows platform, including Active Directory, Rights Management Services (RMS) and Network Access Protection (NAP).<\/p>\n<p>Two of the products under the umbrella of the identity and security group have been in the news recently:<\/p>\n<ul>\n<li>A release candidate of <a href=\"http:\/\/www.microsoft.com\/ilm2\">Identity Lifecycle Manager &#8220;2&#8221;<\/a> is available now.  Due for final release in the first half of 2009, ILM &#8220;2&#8221; provides self-service for employees, enhanced administration and automation for IT professionals, and extensibility for developers.  In developing this product, Microsoft&#8217;s focus was in allowing IT departments to set policies for access, empowering end users and knowledge workers to perform actions and tasks (e.g. reset passwords, manage group membership, etc.).  Until the release of this product, such actions would have required the use of <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2006\/08\/delegation-of-active-directory.htm\">third party products (e.g. Quest Active Roles Server<\/a> and unlike MIIS, which was powerful but had a limited user interface, the focus with ILM is on providing an intuitive management interface and self service capabilities whilst still allowing extensibility (e.g. for audit and compliance purposes).  ILM uses a concept of sets to group objects (e.g. &#8220;All people&#8221;) and then a workflow (authentication, authorisation, or action) may be applied to complete a number of steps (e.g. in a password reset scenario to answer a number of security questions; or approving membership of a group and sending out a notification in a group membership scenario).<\/li>\n<li><a href=\"http:\/\/www.microsoft.com\/iag\/\">Intelligent Application Gateway<\/a> (IAG) service pack 2 is also due for release shortly.  Originally available only in hardware appliance form, <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm\">the former Whale Communications product<\/a> can now be run as a Hyper-V virtual machine to reduce costs and increase flexibility in the infrastructure.  In addition, IAG supports access from non-Microsoft browsers (e.g. Firefox) and platforms (i.e. users running Linux and Mac OS X) and has additional optimisers for recently released applications.  (For those who are unaware of IAG&#8217;s capabilities, it provides granular access to specific applications via an SSL VPN with support for almost any application but optimisations for those which it has an awareness of &#8211; that&#8217;s the &#8220;intelligent&#8221; part of IAG).<\/li>\n<\/ul>\n<p>Other significant developments taking place within the identity and security group include: the <a href=\"http:\/\/www.identityblog.com\/?p=1019\">Windows Azure .NET Identity Framework (codenamed Geneva)<\/a> which provides a Microsoft.NET identity access control service; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm\">Windows Cardspace<\/a>; and <a href=\"http:\/\/www.microsoft.com\/forefront\/stirling\/\">the Forefront integrated security product (codenamed Stirling)<\/a> which will combine the various disparate Forefront components.<\/p>\n<p>From my perspective, I&#8217;m really encouraged to see Microsoft working to provide a more focused approach.  As I&#8217;ve written before, <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/01\/forefront-security-overview.htm\">many of Microsoft&#8217;s identity and security products are the result of acquisitions<\/a> and, whilst it&#8217;s important not to lose the features and functionality that made these products successful in the first place, they also need to be tightly integrated to avoid the inevitable confusion caused by feature overlap and conflicting goals.  It seems to me that Microsoft is working towards providing a sensible and logical identity and security portfolio for customers and partners.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In amongst all the exciting new product announcements for new Windows releases and cloud computing platforms it&#8217;s all too easy to miss out on some of the core infrastructure enhancements that Microsoft is making. Last week I got the chance to catch up with Joel Sider from Microsoft&#8217;s Identity and Security group &#8211; a new &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Identity and security developments at Microsoft<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[129,139,150,43],"class_list":["post-1284","post","type-post","status-publish","format-standard","hentry","tag-forefront","tag-miis","tag-iag","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identity and security developments at Microsoft - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity and security developments at Microsoft - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"In amongst all the exciting new product announcements for new Windows releases and cloud computing platforms it&#8217;s all too easy to miss out on some of the core infrastructure enhancements that Microsoft is making. Last week I got the chance to catch up with Joel Sider from Microsoft&#8217;s Identity and Security group &#8211; a new &hellip; Continue reading Identity and security developments at Microsoft\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2008-11-13T10:29:34+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/identity-and-security-developments-at-microsoft.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/identity-and-security-developments-at-microsoft.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Identity and security developments at Microsoft\",\"datePublished\":\"2008-11-13T10:29:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/identity-and-security-developments-at-microsoft.htm\"},\"wordCount\":621,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Microsoft Forefront\",\"Microsoft Identity Integration Server\",\"Microsoft Intelligent Application Gateway\",\"Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/identity-and-security-developments-at-microsoft.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/identity-and-security-developments-at-microsoft.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/identity-and-security-developments-at-microsoft.htm\",\"name\":\"Identity and security developments at Microsoft - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2008-11-13T10:29:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/identity-and-security-developments-at-microsoft.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/identity-and-security-developments-at-microsoft.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/identity-and-security-developments-at-microsoft.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity and security developments at Microsoft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identity and security developments at Microsoft - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm","og_locale":"en_GB","og_type":"article","og_title":"Identity and security developments at Microsoft - markwilson.it","og_description":"In amongst all the exciting new product announcements for new Windows releases and cloud computing platforms it&#8217;s all too easy to miss out on some of the core infrastructure enhancements that Microsoft is making. Last week I got the chance to catch up with Joel Sider from Microsoft&#8217;s Identity and Security group &#8211; a new &hellip; Continue reading Identity and security developments at Microsoft","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm","og_site_name":"markwilson.it","article_published_time":"2008-11-13T10:29:34+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Identity and security developments at Microsoft","datePublished":"2008-11-13T10:29:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm"},"wordCount":621,"commentCount":0,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Microsoft Forefront","Microsoft Identity Integration Server","Microsoft Intelligent Application Gateway","Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm","name":"Identity and security developments at Microsoft - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2008-11-13T10:29:34+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Identity and security developments at Microsoft"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":1306,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm","url_meta":{"origin":1284,"position":0},"title":"How Microsoft and RSA plan to protect our sensitive data","author":"Mark Wilson","date":"Thursday 4 December 2008","format":false,"excerpt":"Mention Microsoft and security in the same sentence and most people will scoff but these day\u00e2\u20ac\u2122s it really a bit unfair\u00e2\u20ac\u00a6 Windows security has come a long way (it still has a way to go too) but nevertheless, many of the customers that I deal with run third party solutions\u2026","rel":"","context":"In \"Digital Rights Management\"","block_context":{"text":"Digital Rights Management","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/drm"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":675,"url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm","url_meta":{"origin":1284,"position":1},"title":"Microsoft&#8217;s digital identity metasystem","author":"Mark Wilson","date":"Monday 17 July 2006","format":false,"excerpt":"After months of hearing about Windows Vista eye candy (and hardly scraping the surface with anything of real substance with regards to the operating system platform), there seems to be a lot of talk about digital identity at Microsoft right now. A couple of weeks back I was at the\u2026","rel":"","context":"In \"Microsoft\"","block_context":{"text":"Microsoft","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/microsoft"},"img":{"alt_text":"","src":"http:\/\/www.tqlkg.com\/image-1875354-8132995","width":350,"height":200},"classes":[]},{"id":5414,"url":"https:\/\/www.markwilson.co.uk\/blog\/2014\/11\/choosing-an-office-365-identity-model-when-to-use-adfs.htm","url_meta":{"origin":1284,"position":2},"title":"Choosing an Office 365 identity model (when to use ADFS)","author":"Mark Wilson","date":"Tuesday 18 November 2014","format":false,"excerpt":"At the time of writing, Microsoft Office 365 has the ability to work with three identity models: Cloud identity (stored in\u00a0Microsoft Azure Active Directory). Synchronised identity (a copy of the objects from an on-premises Active Directory is made in Microsoft Azure AD), optionally with synchronised password hashes. \u00a0This is also\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5496,"url":"https:\/\/www.markwilson.co.uk\/blog\/2015\/02\/microsoft-accounts-vs-microsofts-organizational-accounts.htm","url_meta":{"origin":1284,"position":3},"title":"&#8220;Microsoft accounts&#8221; vs. Microsoft&#8217;s &#8220;organizational accounts&#8221;","author":"Mark Wilson","date":"Thursday 19 February 2015","format":false,"excerpt":"If you're using Microsoft's online services, you might reasonably expect to authenticate against some form of directory service. \u00a0And, if you have your own directory service (like\u00a0Active Directory), you might reasonably expect to be able to synchronise it with your cloud identity to provide a holistic view to end users.\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":471,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/04\/managing-identity-with-microsoft.htm","url_meta":{"origin":1284,"position":4},"title":"Managing identity with Microsoft Identity Integration Server","author":"Mark Wilson","date":"Monday 18 April 2005","format":false,"excerpt":"I last saw the Microsoft Identity Integration Server (MIIS) product in my days at ICL, when it existed as a product called Zoomit Via. Since then, Microsoft has bought the rights to the metadirectory services technology and rewritten the product in various forms with MIIS 2003 being the latest incarnation,\u2026","rel":"","context":"In \"Microsoft Identity Integration Server\"","block_context":{"text":"Microsoft Identity Integration Server","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/miis"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5944,"url":"https:\/\/www.markwilson.co.uk\/blog\/2015\/09\/overview-of-azure-ad-synchronisation.htm","url_meta":{"origin":1284,"position":5},"title":"Overview of Azure AD synchronisation","author":"Mark Wilson","date":"Thursday 24 September 2015","format":false,"excerpt":"Over the last few months, I've had the opportunity to work with a number of directories that are synchronised from on-premises Active Directory (AD) to Azure AD (AAD) -\u00a0the directory service behind Office 365, Azure, Dynamics, Intune and other business-focused Microsoft online services. I've learned a few things along the\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1284"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1284\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}