Premium Content

Access "Who, what, where? How the cloud complicates identity management"

who_what_where.png

Sponsored by SearchExchange.com

IT security and regulatory compliance require identity and access management. However, the move to the cloud and the spread of mobile devices has added complexity. This handbook looks at tools and best practices for managing authentication, working with cloud providers and understanding how Active Directory can and cannot help.  Access >>>

Table of contents

  • Reassessing identity management best practices
  • Is Password Sync better than AD FS for Office 365 ID management?

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • The benefits and challenges of virtualizing Exchange Server
    virt_exchange_server.png
    E-Handbook

    While virtualizing Exchange Server can reduce operational costs, improve flexibility and consolidate resources, a proper plan is necessary in order ...

  • The many paths to Exchange 2013
    many_paths_to_exchange_2013.png
    E-Handbook

    Exchange 2013 offers features that could benefit administrators and make the idea of hosted Exchange more appealing. We look at how to install and ...

  • Understanding hosted Exchange options
    Handbook_cover_understand_hosted_exch_options.png
    E-Handbook

    Now that more IT admins are getting comfortable with the idea of hosted Exchange, the next challenge is deciding on the best approach to the cloud, ...