RE: [ActiveDir] Identity Management using AD

2003-07-11 Thread Jackson Shaw
Title: Message








Yes, this has
been in the works for some time  to say the least. Glad the release is
out and we are just about finished here at the Catalyst conference where we
showed off our IdM products in our suite last night to a great reception by
attendees. I wasnt at that specific meeting  I think I was
meeting w/Gartner in Connecticut then











From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
Behalf Of Rick Kingslan
Sent: Thursday, July 10, 2003 4:17 PM
To: [EMAIL PROTECTED]
Subject: RE: [ActiveDir] Identity
Management using AD





You're that sure, are you Jackson?
;-)



I had this really interesting discussion
with Kim, Chuck (Director of AD??) a number of developers and Program and
Product Mgrs.in February at the MVP Summit. I'm absolutely floored
that you folks moved that fast on the Identity Management, given the
discussions that we had. Obviously, this has been in the works for some
time for MMS to morph.



I can't say that I remember - were you
there for that meeting (about 12 Server MVP's and about 10 MS folks packed into
a conference room)?

Rick
Kingslan MCSE, MCSA, MCT
Microsoft MVP - Active Directory
Associate Expert
Expert Zone - www.microsoft.com/windowsxp/expertzone
 









From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Jackson Shaw
Sent: Thursday, July 10, 2003 1:32 PM
To: [EMAIL PROTECTED]
Subject: RE: [ActiveDir] Identity
Management using AD

Were
going to make the MV writeable. J











From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Myrick, Todd (NIH/CIT)
Sent: Thursday, July 10, 2003 10:26
 AM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Identity
Management using AD







Meaning being able to make changes in the
metaview to replicate out











It has not been decided.











Todd





-Original Message-
From: Jackson Shaw
[mailto:[EMAIL PROTECTED] 
Sent: Wednesday, July 09, 2003 8:18
 PM
To: [EMAIL PROTECTED]
Subject: RE: [ActiveDir] Identity
Management using AD

We're going to
make the MV writeable...











From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Myrick, Todd (NIH/CIT)
Sent: Tuesday, July 08, 2003 7:12
 AM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Identity
Management using AD







We are in the process of evaluating MIIS
here, and AD is currently our source for authentication information, for
Enterprise application, we are using a custom database running on Critical Path
to sync with other application directories, and get a metaview of the
information for identity management. Currently no one allows the metaview
write access anywhere.











I hope our testing and subsequent
deployment will allow for a more standardized approach like what was described
below.











To build on what Gil wrote, The
reason why SQL server was used to store identity information, was probably
because it was a metaview of all the relevant data needed to construct an
employee including privacy information. Active Directory doesn't need
access to privacy information (SSN#, DOB, etc) nor do many LDAP
applications. The nice thing about MIIS, is that it can create that
metaview for you and store it in a SQL server. So if your privacy
information is only stored in the HR system, and Payroll, Then you can set
ACL's on the info so only those systems get that info.











If you are getting into directories for
both network access and Enterprise Resource and Application use, I suggest
subscribing to the Burton Group papers on Enterprise
directory, and constructing your architecture based on some of their
principals. Now if we could only find a group willing to figure out the
Laws of directories we would be golden... Maybe Murphy is already doing them.











Todd





-Original Message-
From: Gil Kirkpatrick
[mailto:[EMAIL PROTECTED] 
Sent: Monday, July 07, 2003 5:30
 PM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Identity
Management using AD



MSFT internally uses SQL Server as the
authoritative store for identity information, and populates AD from that.





-Original Message-
From: Glenn Corbett
[mailto:[EMAIL PROTECTED] 
Sent: Thursday, July 03, 2003 7:00
 AM
To: [EMAIL PROTECTED]
Subject: [ActiveDir] Identity
Management using AD



All,











We are in the process of redefining our Internet-enabled
applications with a view to a centralised customer/client database. There
has been quite a bit of discussion regarding using AD as this customer
store, since AD will already be in this environment.











I'm a bit hesitant to recommend vanilla AD for
this task, however I can see a number of benefits to this approach, as the
support monkeys can manage the entire environment using the same tools they use
to manage the production environment (ADUC etc).











I've been reading up on the information regarding MIIS (what
little there is), and can see some potential for a configuration such as this,
eg:











- Use AD to store the core

RE: [ActiveDir] Identity Management using AD

2003-07-10 Thread Roger Seielstad
Title: Message



I 
wasn't thinking of what it required as much as what it provides. I'd assume[1] 
that it provided comparible functionality on a smaller scale, but apparently 
there's a reason they want you to deploy the real deal


-- 
Roger D. Seielstad - 
MTS MCSE MS-MVP Sr. Systems Administrator Inovis Inc. 
[1] 
Standard Disclaimers Apply

  
  -Original Message-From: Rick Kingslan 
  [mailto:[EMAIL PROTECTED] Sent: Wednesday, July 09, 2003 8:04 
  PMTo: [EMAIL PROTECTED]Subject: RE: 
  [ActiveDir] Identity Management using AD
  You're right - I can't keep up with the 
  TLA's
  
  As to ADAM - it will run on XP/2003, but does not require 
  that the domain be in native mode or forest functional as we're only hosting 
  an AD environment for specific purposes - not a full functioning DS with every 
  bell and whistle.
  
  
  Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active 
  DirectoryAssociate ExpertExpert Zone - 
  www.microsoft.com/windowsxp/expertzone 
  
  
  From: [EMAIL PROTECTED] 
  [mailto:[EMAIL PROTECTED] On Behalf Of Roger 
  SeielstadSent: Wednesday, July 09, 2003 9:48 AMTo: 
  '[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity 
  Management using AD
  
  WRT 
  = "with regards to" What's the matter? Can't keep up with all the 
  TLA's?[1]
  
  I 
  haven't played with ADAM, but have done a bit of reading. I was assuming, 
  probably incorrectly, that it would only function in the full native mode/2003 
  Forest mode. It doesn't seem to make sense for a product like this to be built 
  to support downlevel DC's.
  -- 
  Roger D. Seielstad 
  - MTS MCSE MS-MVP Sr. Systems Administrator Inovis Inc. 
  
  [1] 
  Three Letter Acronyms
  

-Original Message-From: Rick Kingslan 
[mailto:[EMAIL PROTECTED] Sent: Wednesday, July 09, 2003 9:21 
AMTo: [EMAIL PROTECTED]Subject: RE: 
[ActiveDir] Identity Management using AD
Roger,

I'm not sure that I follow.. Firstly, the 
acronym might have thrown me off - I haven't seen this one. 'WRT 
H' means?

And, to speculate, (seeing as I might be missing 
information with the WRT H thing and all ;-) ) you've messaed 
around with ADAM, right? Can be on WinXP, Server 2003 - create 
multiple instances of an AD structure, but more like an 
AD-lite?


Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - 
Active DirectoryAssociate ExpertExpert Zone - 
www.microsoft.com/windowsxp/expertzone 



From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of Roger 
SeielstadSent: Wednesday, July 09, 2003 6:25 AMTo: 
'[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity 
Management using AD

WRT H, isn't ADAM an Win2k3 'forest'? If so, this isn't an issue, 
right?


-- 
Roger D. 
Seielstad - MTS MCSE MS-MVP Sr. Systems Administrator 
Inovis 
Inc. 

  
  -Original Message-From: Rick 
  Kingslan [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 08, 2003 
  10:12 PMTo: [EMAIL PROTECTED]Subject: RE: 
  [ActiveDir] Identity Management using AD
  Glenn, 
  
  Interesting questions, and I'd like to take a shot at 
  lending an opinion on some of these points. Firstly, privacy seems 
  to have become a trure art form in the States. From 
  Graham-Leach-Bliley to HIPPA, we're regulated to the n-th degree. 
  I'm not sure if it's good or bad - but it's something to be aware 
  of. Then, to the other extreme - the Higher Educationalsystem 
  where the 1st Amendment meets rational thought and security. 
  ;-)
  
  a) I agree 100% I think AD is a very well 
  designed store for this type of storage - given that triple-A is available 
  out of the box (authorization, authentication, 
  auditing)
  b) True - fairly static - not changing much. 
  Just enough to keep the Identity portion in place.
  c) Nope - see D
  d)ADAM - Active Directory Application 
  Mode. Synching available, greater level with MMS (MIIS??) multiple 
  instances and truly designed for the application 
  depository
  e) Joe is going to be the man to answer this - he's 
  been doing the massive number management function - though I don't think 
  to this number. ;-)
  f) Passport (and to some degree, rightly so) has been 
  beat up pretty badly However, in your environment, Passport may be 
  more viable than how it is being leveraged by MS
  g) Heh - layering these things is possible, 
  though it can get hairy to manage. Mapping of certs to names / 
  objects, expansion of schema for new funtion to handle biometrics, and the 
  smart card option is all pretty good - but smart car

RE: [ActiveDir] Identity Management using AD

2003-07-10 Thread Jackson Shaw
Title: Message








It provides all
of the LDAP capabilities of AD without the added baggage of things like DNS,
DHCP etc etc  its a standalone LDAP directory with additional
bells  whistles like:



-
doesnt need to run on a DC

-
multiple instances running on one machine

-
instances are NT services so you can easily stop/start

-
comes with a bunch of schema choices (i.e., inetOrgPerson)

-
schema can be changed with re-booting the server

-
runs on XP for development

-
uses the same tools used for AD so mgmt is what you are used to

-
same code base as AD so you get all of the replication and
scalability capabilities that are already inherent











From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
Behalf Of Roger Seielstad
Sent: Thursday, July 10, 2003 3:50 AM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Identity
Management using AD







I wasn't thinking of what it required as
much as what it provides. I'd assume[1] that it provided comparible
functionality on a smaller scale, but apparently there's a reason they want you
to deploy the real deal















--

Roger D. Seielstad - MTS MCSE MS-MVP 
Sr. Systems Administrator 
Inovis Inc. 

[1] Standard Disclaimers Apply



-Original Message-
From: Rick Kingslan
[mailto:[EMAIL PROTECTED] 
Sent: Wednesday, July 09, 2003 8:04 PM
To: [EMAIL PROTECTED]
Subject: RE: [ActiveDir] Identity
Management using AD

You're right - I can't keep up with the
TLA's



As to ADAM - it will run on XP/2003, but
does not require that the domain be in native mode or forest functional as
we're only hosting an AD environment for specific purposes - not a full
functioning DS with every bell and whistle.



Rick
Kingslan MCSE, MCSA, MCT
Microsoft MVP - Active Directory
Associate Expert
Expert Zone - www.microsoft.com/windowsxp/expertzone
 









From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Roger Seielstad
Sent: Wednesday, July 09, 2003 9:48 AM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Identity
Management using AD



WRT = with regards to What's
the matter? Can't keep up with all the TLA's?[1]











I haven't played with ADAM, but have done
a bit of reading. I was assuming, probably incorrectly, that it would only
function in the full native mode/2003
 Forest mode. It doesn't
seem to make sense for a product like this to be built to support downlevel
DC's.





--

Roger D. Seielstad - MTS MCSE MS-MVP 
Sr. Systems Administrator 
Inovis Inc. 

[1] Three Letter Acronyms



-Original Message-
From: Rick Kingslan
[mailto:[EMAIL PROTECTED] 
Sent: Wednesday, July 09, 2003 9:21 AM
To: [EMAIL PROTECTED]
Subject: RE: [ActiveDir] Identity
Management using AD

Roger,



I'm not sure that I follow..
Firstly, the acronym might have thrown me off - I haven't seen this
one. 'WRT H' means?



And, to speculate, (seeing as I might be
missing information with the WRT H thing and all ;-) ) you've messaed
around with ADAM, right? Can be on WinXP, Server 2003 - create multiple
instances of an AD structure, but more like an AD-lite?



Rick
Kingslan MCSE, MCSA, MCT
Microsoft MVP - Active Directory
Associate Expert
Expert Zone - www.microsoft.com/windowsxp/expertzone
 









From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
Behalf Of Roger Seielstad
Sent: Wednesday, July 09, 2003 6:25 AM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Identity
Management using AD



WRT H, isn't ADAM an Win2k3 'forest'? If
so, this isn't an issue, right?

















--

Roger D. Seielstad - MTS MCSE MS-MVP 
Sr. Systems Administrator 
Inovis Inc. 



-Original Message-
From: Rick Kingslan
[mailto:[EMAIL PROTECTED] 
Sent: Tuesday, July 08, 2003 10:12 PM
To: [EMAIL PROTECTED]
Subject: RE: [ActiveDir] Identity
Management using AD

Glenn, 



Interesting questions, and I'd like to
take a shot at lending an opinion on some of these points. Firstly,
privacy seems to have become a trure art form in the States. From
Graham-Leach-Bliley to HIPPA, we're regulated to the n-th degree. I'm not
sure if it's good or bad - but it's something to be aware of. Then, to
the other extreme - the Higher Educationalsystem where the 1st Amendment
meets rational thought and security. ;-)



a) I agree 100% I think AD is a very
well designed store for this type of storage - given that triple-A is available
out of the box (authorization, authentication, auditing)

b) True - fairly static - not changing
much. Just enough to keep the Identity portion in place.

c) Nope - see D

d)ADAM - Active Directory
Application Mode. Synching available, greater level with MMS (MIIS??)
multiple instances and truly designed for the application depository

e) Joe is going to be the man to answer
this - he's been doing the massive number management function - though I don't

RE: [ActiveDir] Identity Management using AD

2003-07-10 Thread Myrick, Todd (NIH/CIT)
Title: Message



Meaning being able to make changes in the metaview to replicate 
out

It has 
not been decided.

Todd

  
  -Original Message-From: Jackson Shaw 
  [mailto:[EMAIL PROTECTED] Sent: Wednesday, July 09, 
  2003 8:18 PMTo: [EMAIL PROTECTED]Subject: RE: 
  [ActiveDir] Identity Management using AD
  
  We're going 
  to make the MV writeable...
  
  
  
  
  
  From: 
  [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
  On Behalf Of Myrick, Todd 
  (NIH/CIT)Sent: Tuesday, 
  July 08, 2003 
  7:12 AMTo: 
  '[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity 
  Management using AD
  
  
  We are in the process 
  of evaluating MIIS here, and AD is currently our source for authentication 
  information, for Enterprise application, we are using a custom database 
  running on Critical Path to sync with other application directories, and get a 
  metaview of the information for identity management. Currently no one 
  allows the metaview write access anywhere.
  
  
  
  I hope our testing 
  and subsequent deployment will allow for a more standardized approach like 
  what was described below.
  
  
  
  To build on what Gil 
  wrote, The reason why SQL server was used to store identity information, 
  was probably because it was a metaview of all the relevant data needed to 
  construct an employee including privacy information. Active Directory 
  doesn't need access to privacy information (SSN#, DOB, etc) nor do many LDAP 
  applications. The nice thing about MIIS, is that it can create that 
  metaview for you and store it in a SQL server. So if your privacy 
  information is only stored in the HR system, and Payroll, Then you can set 
  ACL's on the info so only those systems get that 
  info.
  
  
  
  If you are getting 
  into directories for both network access and Enterprise Resource and 
  Application use, I suggest subscribing to the Burton Group papers on Enterprise directory, and constructing your architecture 
  based on some of their principals. Now if we could only find a group 
  willing to figure out the Laws of directories we would be golden... Maybe 
  Murphy is already doing them.
  
  
  
  Todd
  
-Original 
Message-From: Gil 
Kirkpatrick [mailto:[EMAIL PROTECTED] Sent: Monday, July 07, 2003 
5:30 PMTo: 
'[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity 
Management using AD

MSFT internally 
uses SQL Server as the authoritative store for identity information, and 
populates AD from that.
-Original 
  Message-From: Glenn 
  Corbett [mailto:[EMAIL PROTECTED] Sent: Thursday, July 03, 
  2003 7:00 
  AMTo: 
  [EMAIL PROTECTED]Subject: [ActiveDir] Identity 
  Management using AD
  
  All,
  
  
  
  We are in the process of 
  redefining our Internet-enabled applications with a view to a centralised 
  customer/client database. There has been quite a bit of discussion 
  regarding using AD as this "customer store", since AD will already be in 
  this environment.
  
  
  
  I'm a bit hesitant to 
  recommend "vanilla" AD for this task, however I can see a number of 
  benefits to this approach, as the support monkeys can manage the entire 
  environment using the same tools they use to manage the production 
  environment (ADUC etc).
  
  
  
  I've been reading up on the 
  information regarding MIIS (what little there is), and can see some 
  potential for a configuration such as this, 
  eg:
  
  
  
  - Use AD to store the "core" 
  customer information (user name, password, basic 
  details)
  
  - Use ADAM or SQL (or 
  whatever) for each application to store application specific extensions 
  (so I don't end up with a blown out schema in AD with thousands of 
  additional props for user objects)
  
  - Use MIIS as the 
  Authentication / Identity management front end, and use it to sync these 
  disparate databases to ensure some semblance of "sameness" between 
  them.
  
  - Also use some of the MIIS 
  features such as provisioning etc to ease the management 
  overhead.
  
  
  
  Applications could use AD to 
  authenticate the customer coming in, and then use their ADAM database to 
  house the application specific information they 
  need.
  
  
  
  We could possibly then use 
  MIIS to "backchannel" into the production AD system, so that corporate 
  users can gain access to these Internet applications without requiring 
  multiple accounts.
  
  
  
  This is all just brainstorming 
  at the moment, however (as usual), I need to come up with some sort of 
  design by next week (gotta love being given lots of time *grin*). 
  Having not actually got my hands o

RE: [ActiveDir] Identity Management using AD

2003-07-10 Thread Jackson Shaw
Title: Message








Were
going to make the MV writeable. J











From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Myrick, Todd (NIH/CIT)
Sent: Thursday, July 10, 2003 10:26 AM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Identity
Management using AD







Meaning being able to make changes in the
metaview to replicate out











It has not been decided.











Todd





-Original Message-
From: Jackson
 Shaw [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, July 09, 2003 8:18 PM
To: [EMAIL PROTECTED]
Subject: RE: [ActiveDir] Identity
Management using AD

We're going to
make the MV writeable...











From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Myrick, Todd (NIH/CIT)
Sent: Tuesday, July 08, 2003 7:12
 AM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Identity
Management using AD







We are in the process of evaluating MIIS
here, and AD is currently our source for authentication information, for Enterprise
application, we are using a custom database running on Critical Path to sync
with other application directories, and get a metaview of the information for
identity management. Currently no one allows the metaview write access
anywhere.











I hope our testing and subsequent
deployment will allow for a more standardized approach like what was described
below.











To build on what Gil wrote, The
reason why SQL server was used to store identity information, was probably
because it was a metaview of all the relevant data needed to construct an
employee including privacy information. Active Directory doesn't need
access to privacy information (SSN#, DOB, etc) nor do many LDAP
applications. The nice thing about MIIS, is that it can create that metaview
for you and store it in a SQL server. So if your privacy information is
only stored in the HR system, and Payroll, Then you can set ACL's on the info
so only those systems get that info.











If you are getting into directories for
both network access and Enterprise Resource and Application use, I suggest
subscribing to the Burton Group papers on Enterprise
directory, and constructing your architecture based on some of their
principals. Now if we could only find a group willing to figure out the
Laws of directories we would be golden... Maybe Murphy is already doing them.











Todd





-Original Message-
From: Gil Kirkpatrick
[mailto:[EMAIL PROTECTED] 
Sent: Monday, July 07, 2003 5:30
 PM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Identity
Management using AD



MSFT internally uses SQL Server as the
authoritative store for identity information, and populates AD from that.





-Original Message-
From: Glenn Corbett
[mailto:[EMAIL PROTECTED] 
Sent: Thursday, July 03, 2003 7:00
 AM
To: [EMAIL PROTECTED]
Subject: [ActiveDir] Identity
Management using AD



All,











We are in the process of redefining our Internet-enabled
applications with a view to a centralised customer/client database. There
has been quite a bit of discussion regarding using AD as this customer
store, since AD will already be in this environment.











I'm a bit hesitant to recommend vanilla AD for
this task, however I can see a number of benefits to this approach, as the
support monkeys can manage the entire environment using the same tools they use
to manage the production environment (ADUC etc).











I've been reading up on the information regarding MIIS (what
little there is), and can see some potential for a configuration such as this,
eg:











- Use AD to store the core customer information
(user name, password, basic details)





- Use ADAM or SQL (or whatever) for each application to
store application specific extensions (so I don't end up with a blown out
schema in AD with thousands of additional props for user objects)





- Use MIIS as the Authentication / Identity management front
end, and use it to sync these disparate databases to ensure some semblance of
sameness between them.





- Also use some of the MIIS features such as provisioning
etc to ease the management overhead.











Applications could use AD to authenticate the customer
coming in, and then use their ADAM database to house the application specific
information they need.











We could possibly then use MIIS to backchannel
into the production AD system, so that corporate users can gain access to these
Internet applications without requiring multiple accounts.











This is all just brainstorming at the moment, however (as
usual), I need to come up with some sort of design by next week (gotta love
being given lots of time *grin*). Having not actually got my hands on
MIIS, this could be completely unfeasible. Other options are a custom
database for the customer store, or some other existing product.











Has anyone been down this road before, and could share some insights
/ resources ?











Thanks











Glenn


































RE: [ActiveDir] Identity Management using AD

2003-07-10 Thread Rick Kingslan
Title: Message



You're that sure, are you Jackson? 
;-)

I had this really interesting discussion with Kim, Chuck 
(Director of AD??) a number of developers and Program and Product Mgrs.in 
February at the MVP Summit. I'm absolutely floored that you folks moved 
that fast on the Identity Management, given the discussions that we had. 
Obviously, this has been in the works for some time for MMS to 
morph.

I can't say that I remember - were you there for that 
meeting (about 12 Server MVP's and about 10 MS folks packed into a conference 
room)?

Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active 
DirectoryAssociate ExpertExpert Zone - 
www.microsoft.com/windowsxp/expertzone 


From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of Jackson 
ShawSent: Thursday, July 10, 2003 1:32 PMTo: 
[EMAIL PROTECTED]Subject: RE: [ActiveDir] Identity 
Management using AD


Were going 
to make the MV writeable. J





From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Myrick, Todd 
(NIH/CIT)Sent: Thursday, 
July 10, 
2003 10:26 
AMTo: 
'[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity 
Management using AD


Meaning being able to 
make changes in the metaview to replicate 
out



It has not been 
decided.



Todd

  -Original 
  Message-From: 
  Jackson Shaw 
  [mailto:[EMAIL PROTECTED] Sent: Wednesday, July 09, 
  2003 8:18 
  PMTo: 
  [EMAIL PROTECTED]Subject: RE: [ActiveDir] Identity 
  Management using AD
  We're going 
  to make the MV writeable...
  
  
  
  
  
  From: 
  [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
  On Behalf Of Myrick, Todd 
  (NIH/CIT)Sent: Tuesday, 
  July 08, 
  2003 7:12 
  AMTo: 
  '[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity 
  Management using AD
  
  
  We are in the process 
  of evaluating MIIS here, and AD is currently our source for authentication 
  information, for Enterprise application, we are using a custom database 
  running on Critical Path to sync with other application directories, and get a 
  metaview of the information for identity management. Currently no one 
  allows the metaview write access anywhere.
  
  
  
  I hope our testing 
  and subsequent deployment will allow for a more standardized approach like 
  what was described below.
  
  
  
  To build on what Gil 
  wrote, The reason why SQL server was used to store identity information, 
  was probably because it was a metaview of all the relevant data needed to 
  construct an employee including privacy information. Active Directory 
  doesn't need access to privacy information (SSN#, DOB, etc) nor do many LDAP 
  applications. The nice thing about MIIS, is that it can create that 
  metaview for you and store it in a SQL server. So if your privacy 
  information is only stored in the HR system, and Payroll, Then you can set 
  ACL's on the info so only those systems get that 
  info.
  
  
  
  If you are getting 
  into directories for both network access and Enterprise Resource and 
  Application use, I suggest subscribing to the Burton Group papers on Enterprise directory, and constructing your architecture 
  based on some of their principals. Now if we could only find a group 
  willing to figure out the Laws of directories we would be golden... Maybe 
  Murphy is already doing them.
  
  
  
  Todd
  
-Original 
Message-From: Gil 
Kirkpatrick [mailto:[EMAIL PROTECTED] Sent: Monday, July 07, 
2003 5:30 
PMTo: 
'[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity 
Management using AD

MSFT internally 
uses SQL Server as the authoritative store for identity information, and 
populates AD from that.
-Original 
  Message-From: Glenn 
  Corbett [mailto:[EMAIL PROTECTED] Sent: Thursday, July 03, 
  2003 7:00 
  AMTo: 
  [EMAIL PROTECTED]Subject: [ActiveDir] Identity 
  Management using AD
  
  All,
  
  
  
  We are in the process of 
  redefining our Internet-enabled applications with a view to a centralised 
  customer/client database. There has been quite a bit of discussion 
  regarding using AD as this "customer store", since AD will already be in 
  this environment.
  
  
  
  I'm a bit hesitant to 
  recommend "vanilla" AD for this task, however I can see a number of 
  benefits to this approach, as the support monkeys can manage the entire 
  environment using the same tools they use to manage the production 
  environment (ADUC etc).
  
  
  
  I've been reading up on the 
  information regarding MIIS (what little there is), and can see some 
  potential for a configuration such as this, 
  eg:
  
  
  
  - Use AD to store the "core" 
  customer information (user name, password, basic 
  details)
  
  - Use ADAM or SQL (or 
  whatever) for each application to store application specific extensions 
  (

RE: [ActiveDir] Identity Management using AD

2003-07-10 Thread Joe
Title: Message



I 
didn't read the entire post, got a new laptop and just scanning quickly so I 
won't feel guilty about my community helping while wiping XP Home and loading 
2k3. 


e. 
Thanks for the nod Rick. Nope I don't do things to thisdegree but it 
shouldn't be overly difficult to manage if you have someone who can write web 
code and AD code (either ldap or ADSI). The big thing would be if you can 
subdelegate out management to lower levels like for instance if the people are 
all at different companies you give one or more people in that company the 
ability to do things based on business rules you set up in the web code. 


Note 
there is nothing really in the native environment to do this out of the box. You 
will be inventing something. I am not even aware of anything for sale like this 
though it could exist in niche pockets. 

I 
would really recommend figuring out how these ID's are going to be used if 
people are doing any kind of LDAP searches against them and come up with a good 
scheme for OU layering and indexed uniqque attributes as it would take a bit to 
do a poor search across several million user objects. 



  
  -Original Message-From: 
  [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
  On Behalf Of Rick KingslanSent: Tuesday, July 08, 2003 10:12 
  PMTo: [EMAIL PROTECTED]Subject: RE: 
  [ActiveDir] Identity Management using AD
  Glenn, 
  
  Interesting questions, and I'd like to take a shot at 
  lending an opinion on some of these points. Firstly, privacy seems to 
  have become a trure art form in the States. From Graham-Leach-Bliley to 
  HIPPA, we're regulated to the n-th degree. I'm not sure if it's good or 
  bad - but it's something to be aware of. Then, to the other extreme - 
  the Higher Educationalsystem where the 1st Amendment meets rational 
  thought and security. ;-)
  
  a) I agree 100% I think AD is a very well designed 
  store for this type of storage - given that triple-A is available out of the 
  box (authorization, authentication, auditing)
  b) True - fairly static - not changing much. Just 
  enough to keep the Identity portion in place.
  c) Nope - see D
  d)ADAM - Active Directory Application Mode. 
  Synching available, greater level with MMS (MIIS??) multiple instances and 
  truly designed for the application depository
  e) Joe is going to be the man to answer this - he's been 
  doing the massive number management function - though I don't think to this 
  number. ;-)
  f) Passport (and to some degree, rightly so) has been 
  beat up pretty badly However, in your environment, Passport may be more 
  viable than how it is being leveraged by MS
  g) Heh - layering these things is possible, though 
  it can get hairy to manage. Mapping of certs to names / objects, 
  expansion of schema for new funtion to handle biometrics, and the smart card 
  option is all pretty good - but smart card is going to leverage certs to some 
  degree at some level Not knowing what price level / sensitivity of data 
  / regulations you are delaing with makes it a bit hard for me to suggest 
  anything, but any layering is obviously going to raise the price becasue of 
  the complexity / added hardware / software and added processor for keyed type 
  solutions
  h) Can't say that I've run into any or know of anyone 
  that has (well - not completely true I know Gary Olsen with HP, and he ran 
  into the KCC issue mentioned in a moment)- obviously, they are 
  there. Microsoft claims to have tested to billions of objects - and I 
  have no reason to not believe this to be true. TheKCC 
  topology(KCC cannot work if (1 + #Domains) x sites^2  100,000) issue 
  of Windows 2000 does indicate that there are issues here and there. They 
  get fixed, but usually are big fixes. In the case of the KCC issue, it's 
  fixed in Server 2003, but only once you get to 2003 Forest Functional 
  mode. That's a big move.
  i) Because it's there. Oh, wait! That's 
  for mountains. never mind.
  
  
  Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active 
  DirectoryAssociate ExpertExpert Zone - 
  www.microsoft.com/windowsxp/expertzone 
  
  
  From: [EMAIL PROTECTED] 
  [mailto:[EMAIL PROTECTED] On Behalf Of Glenn 
  CorbettSent: Tuesday, July 08, 2003 6:36 PMTo: 
  [EMAIL PROTECTED]Subject: Re: [ActiveDir] Identity 
  Management using AD
  
  Thanks Todd.
  
  At the moment, we arent hugely concerned about 
  putting *some* privacy information into AD, as this instance of AD will only 
  be for our external clients, and the attribute level ACL's provided by AD 
  should provide enough security to stop certain applications / users from 
  seeing this information. That being said, we are looking into the 
  appropiate laws / leglislation / statutes regarding privacy and the storage of 
  personal information to make sure we are covered from that 
aspect.
  
  I've done the required high level checking, 
  andAD shouldnt have any trouble storing the amount and type

Re: [ActiveDir] Identity Management using AD

2003-07-09 Thread Glenn Corbett
Title: Message



Funny you should mention Higher Education. We are 
the Govt Dept that looks after the Federal Govt (Australian, not US) Policy on 
them :)

Well, as a result of all of this process (had the 
discussion today), we are going down a similar path to what I original discussed 
(AD for basic client repository, SQL and ADAM for application extension 
information).

The application team has a authentication / 
authorisation "shim", which currently talks to a SQL database to provide the 
functionality. They are going to make some minor modifications to use AD 
as the authentication / authorisation module for this shim, so should be smooth 
sailing (famous last words)

on point a) auditing is one thing that I didnt 
think of at the time, but occured to me in the middle of the discussion. 
Another tick in the AD column *grin*

on point e) it looks like we will end up with a 
number of different interfaces. MMC for general admins, customised apps for app 
owners, web interfaces for customer self-service. The delegation model is 
going to be a bit hairy, as they want to perform some level of seperation of 
client user bases, and do little or no sharing of information (at least 
initially). An OU and delegation for each application groupwill 
probably be the best bet.

on point f) they do have an additional "shim" for 
this A/A abstraction layer that supports passport, however even they dont want 
to use it...not sure exactly what that says about passport (if 
anything).

on point g) adding these levels of authentication 
really isnt a huge issue (from my perspective as the infrastructure guy), 
however the management interfaces will (most likely) need some serious retooling 
to cope with multiple authentication methods (passwords, smartcards, 
biometrics), as the current ones are only geared for the standard username / 
password combination.

on point h) I agree, there are some sizing / 
performance limitations once you start getting up the big end of town, hopefully 
we will be able to either a) see them and work around them, or b) never hit 
them. I'm doing up some scripts atm to populate AD with a bunch of information 
and see what holes I can fall into.

Now to do some sizing / performance testing, the 
first application they want to put on will have up to 800,000 user objects 
*yay*

Thanks for everyones input.

G.


  - Original Message - 
  From: 
  Rick Kingslan 
  
  To: [EMAIL PROTECTED] 
  
  Sent: Wednesday, July 09, 2003 12:12 
  PM
  Subject: RE: [ActiveDir] Identity 
  Management using AD
  
  Glenn, 
  
  Interesting questions, and I'd like to take a shot at 
  lending an opinion on some of these points. Firstly, privacy seems to 
  have become a trure art form in the States. From Graham-Leach-Bliley to 
  HIPPA, we're regulated to the n-th degree. I'm not sure if it's good or 
  bad - but it's something to be aware of. Then, to the other extreme - 
  the Higher Educationalsystem where the 1st Amendment meets rational 
  thought and security. ;-)
  
  a) I agree 100% I think AD is a very well designed 
  store for this type of storage - given that triple-A is available out of the 
  box (authorization, authentication, auditing)
  b) True - fairly static - not changing much. Just 
  enough to keep the Identity portion in place.
  c) Nope - see D
  d)ADAM - Active Directory Application Mode. 
  Synching available, greater level with MMS (MIIS??) multiple instances and 
  truly designed for the application depository
  e) Joe is going to be the man to answer this - he's been 
  doing the massive number management function - though I don't think to this 
  number. ;-)
  f) Passport (and to some degree, rightly so) has been 
  beat up pretty badly However, in your environment, Passport may be more 
  viable than how it is being leveraged by MS
  g) Heh - layering these things is possible, though 
  it can get hairy to manage. Mapping of certs to names / objects, 
  expansion of schema for new funtion to handle biometrics, and the smart card 
  option is all pretty good - but smart card is going to leverage certs to some 
  degree at some level Not knowing what price level / sensitivity of data 
  / regulations you are delaing with makes it a bit hard for me to suggest 
  anything, but any layering is obviously going to raise the price becasue of 
  the complexity / added hardware / software and added processor for keyed type 
  solutions
  h) Can't say that I've run into any or know of anyone 
  that has (well - not completely true I know Gary Olsen with HP, and he ran 
  into the KCC issue mentioned in a moment)- obviously, they are 
  there. Microsoft claims to have tested to billions of objects - and I 
  have no reason to not believe this to be true. TheKCC 
  topology(KCC cannot work if (1 + #Domains) x sites^2  100,000) issue 
  of Windows 2000 does indicate that there are issues here and there. They 
  get fixed, but usually are big fixes. In the case of

RE: [ActiveDir] Identity Management using AD

2003-07-09 Thread Roger Seielstad
Title: Message



WRT 
H, isn't ADAM an Win2k3 'forest'? If so, this isn't an issue, 
right?


-- 
Roger D. Seielstad - 
MTS MCSE MS-MVP Sr. Systems Administrator Inovis Inc. 

  
  -Original Message-From: Rick Kingslan 
  [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 08, 2003 10:12 
  PMTo: [EMAIL PROTECTED]Subject: RE: 
  [ActiveDir] Identity Management using AD
  Glenn, 
  
  Interesting questions, and I'd like to take a shot at 
  lending an opinion on some of these points. Firstly, privacy seems to 
  have become a trure art form in the States. From Graham-Leach-Bliley to 
  HIPPA, we're regulated to the n-th degree. I'm not sure if it's good or 
  bad - but it's something to be aware of. Then, to the other extreme - 
  the Higher Educationalsystem where the 1st Amendment meets rational 
  thought and security. ;-)
  
  a) I agree 100% I think AD is a very well designed 
  store for this type of storage - given that triple-A is available out of the 
  box (authorization, authentication, auditing)
  b) True - fairly static - not changing much. Just 
  enough to keep the Identity portion in place.
  c) Nope - see D
  d)ADAM - Active Directory Application Mode. 
  Synching available, greater level with MMS (MIIS??) multiple instances and 
  truly designed for the application depository
  e) Joe is going to be the man to answer this - he's been 
  doing the massive number management function - though I don't think to this 
  number. ;-)
  f) Passport (and to some degree, rightly so) has been 
  beat up pretty badly However, in your environment, Passport may be more 
  viable than how it is being leveraged by MS
  g) Heh - layering these things is possible, though 
  it can get hairy to manage. Mapping of certs to names / objects, 
  expansion of schema for new funtion to handle biometrics, and the smart card 
  option is all pretty good - but smart card is going to leverage certs to some 
  degree at some level Not knowing what price level / sensitivity of data 
  / regulations you are delaing with makes it a bit hard for me to suggest 
  anything, but any layering is obviously going to raise the price becasue of 
  the complexity / added hardware / software and added processor for keyed type 
  solutions
  h) Can't say that I've run into any or know of anyone 
  that has (well - not completely true I know Gary Olsen with HP, and he ran 
  into the KCC issue mentioned in a moment)- obviously, they are 
  there. Microsoft claims to have tested to billions of objects - and I 
  have no reason to not believe this to be true. TheKCC 
  topology(KCC cannot work if (1 + #Domains) x sites^2  100,000) issue 
  of Windows 2000 does indicate that there are issues here and there. They 
  get fixed, but usually are big fixes. In the case of the KCC issue, it's 
  fixed in Server 2003, but only once you get to 2003 Forest Functional 
  mode. That's a big move.
  i) Because it's there. Oh, wait! That's 
  for mountains. never mind.
  
  
  Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active 
  DirectoryAssociate ExpertExpert Zone - 
  www.microsoft.com/windowsxp/expertzone 
  
  
  From: [EMAIL PROTECTED] 
  [mailto:[EMAIL PROTECTED] On Behalf Of Glenn 
  CorbettSent: Tuesday, July 08, 2003 6:36 PMTo: 
  [EMAIL PROTECTED]Subject: Re: [ActiveDir] Identity 
  Management using AD
  
  Thanks Todd.
  
  At the moment, we arent hugely concerned about 
  putting *some* privacy information into AD, as this instance of AD will only 
  be for our external clients, and the attribute level ACL's provided by AD 
  should provide enough security to stop certain applications / users from 
  seeing this information. That being said, we are looking into the 
  appropiate laws / leglislation / statutes regarding privacy and the storage of 
  personal information to make sure we are covered from that 
aspect.
  
  I've done the required high level checking, 
  andAD shouldnt have any trouble storing the amount and type of 
  information we require (up to 6-8 million user objects, several thousand 
  groups etc), its really down to the following questions:
  
  a) Is AD an *appropiate* store for this sort of 
  information (my answer would be yes, based on the Authentication / 
  Authorisation provided by AD)
  b) What sorts of information should be stored in 
  AD (I'll be pointing out the often read / rarely written aspects of 
  AD)
  c) for application specific extensions, is this 
  appropiate to store in AD (my current thinking is NO, as I'll end up with 
  several hundred additional user properties, better to store them elsewhere and 
  sync)
  d) in relation to c, if not in AD, then where, 
  and how to keep these disprate databases in sync
  e) What management tools / processes are required 
  to manage a 6-8 million user AD, and what are the associated security 
  implications (eg exposing the admin interfaces to the internet, as opposed to 
  just

RE: [ActiveDir] Identity Management using AD

2003-07-09 Thread Rick Kingslan
Title: Message



Roger,

I'm not sure that I follow.. Firstly, the acronym 
might have thrown me off - I haven't seen this one. 'WRT H' 
means?

And, to speculate, (seeing as I might be missing 
information with the WRT H thing and all ;-) ) you've messaed around 
with ADAM, right? Can be on WinXP, Server 2003 - create multiple instances 
of an AD structure, but more like an AD-lite?


Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active 
DirectoryAssociate ExpertExpert Zone - 
www.microsoft.com/windowsxp/expertzone 


From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of Roger 
SeielstadSent: Wednesday, July 09, 2003 6:25 AMTo: 
'[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity 
Management using AD

WRT 
H, isn't ADAM an Win2k3 'forest'? If so, this isn't an issue, 
right?


-- 
Roger D. Seielstad - 
MTS MCSE MS-MVP Sr. Systems Administrator Inovis Inc. 

  
  -Original Message-From: Rick Kingslan 
  [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 08, 2003 10:12 
  PMTo: [EMAIL PROTECTED]Subject: RE: 
  [ActiveDir] Identity Management using AD
  Glenn, 
  
  Interesting questions, and I'd like to take a shot at 
  lending an opinion on some of these points. Firstly, privacy seems to 
  have become a trure art form in the States. From Graham-Leach-Bliley to 
  HIPPA, we're regulated to the n-th degree. I'm not sure if it's good or 
  bad - but it's something to be aware of. Then, to the other extreme - 
  the Higher Educationalsystem where the 1st Amendment meets rational 
  thought and security. ;-)
  
  a) I agree 100% I think AD is a very well designed 
  store for this type of storage - given that triple-A is available out of the 
  box (authorization, authentication, auditing)
  b) True - fairly static - not changing much. Just 
  enough to keep the Identity portion in place.
  c) Nope - see D
  d)ADAM - Active Directory Application Mode. 
  Synching available, greater level with MMS (MIIS??) multiple instances and 
  truly designed for the application depository
  e) Joe is going to be the man to answer this - he's been 
  doing the massive number management function - though I don't think to this 
  number. ;-)
  f) Passport (and to some degree, rightly so) has been 
  beat up pretty badly However, in your environment, Passport may be more 
  viable than how it is being leveraged by MS
  g) Heh - layering these things is possible, though 
  it can get hairy to manage. Mapping of certs to names / objects, 
  expansion of schema for new funtion to handle biometrics, and the smart card 
  option is all pretty good - but smart card is going to leverage certs to some 
  degree at some level Not knowing what price level / sensitivity of data 
  / regulations you are delaing with makes it a bit hard for me to suggest 
  anything, but any layering is obviously going to raise the price becasue of 
  the complexity / added hardware / software and added processor for keyed type 
  solutions
  h) Can't say that I've run into any or know of anyone 
  that has (well - not completely true I know Gary Olsen with HP, and he ran 
  into the KCC issue mentioned in a moment)- obviously, they are 
  there. Microsoft claims to have tested to billions of objects - and I 
  have no reason to not believe this to be true. TheKCC 
  topology(KCC cannot work if (1 + #Domains) x sites^2  100,000) issue 
  of Windows 2000 does indicate that there are issues here and there. They 
  get fixed, but usually are big fixes. In the case of the KCC issue, it's 
  fixed in Server 2003, but only once you get to 2003 Forest Functional 
  mode. That's a big move.
  i) Because it's there. Oh, wait! That's 
  for mountains. never mind.
  
  
  Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active 
  DirectoryAssociate ExpertExpert Zone - 
  www.microsoft.com/windowsxp/expertzone 
  
  
  From: [EMAIL PROTECTED] 
  [mailto:[EMAIL PROTECTED] On Behalf Of Glenn 
  CorbettSent: Tuesday, July 08, 2003 6:36 PMTo: 
  [EMAIL PROTECTED]Subject: Re: [ActiveDir] Identity 
  Management using AD
  
  Thanks Todd.
  
  At the moment, we arent hugely concerned about 
  putting *some* privacy information into AD, as this instance of AD will only 
  be for our external clients, and the attribute level ACL's provided by AD 
  should provide enough security to stop certain applications / users from 
  seeing this information. That being said, we are looking into the 
  appropiate laws / leglislation / statutes regarding privacy and the storage of 
  personal information to make sure we are covered from that 
aspect.
  
  I've done the required high level checking, 
  andAD shouldnt have any trouble storing the amount and type of 
  information we require (up to 6-8 million user objects, several thousand 
  groups etc), its really down to the following questions:
  
  a) Is AD an *appropiate* store for this sort of 
  information (my answer would be yes

RE: [ActiveDir] Identity Management using AD

2003-07-09 Thread deji
In English:
 
Roger is saying that since ADAM will obviously be in a Windows 2003 Forest, then your 
points at item H are moot. WRT = With Regards To
 
 
Sincerely,

Dèjì Akómöláfé, MCSE MCSA MCP+I
www.akomolafe.com
www.iyaburo.com
Do you now realize that Today is the Tomorrow you were worried about Yesterday?  -anon



From: [EMAIL PROTECTED] on behalf of Rick Kingslan
Sent: Wed 7/9/2003 6:20 AM
To: [EMAIL PROTECTED]
Subject: RE: [ActiveDir] Identity Management using AD


Roger,
 
I'm not sure that I follow..  Firstly, the acronym might have thrown me off - I 
haven't seen this one.  'WRT H' means?
 
And, to speculate, (seeing as I might be missing information with the WRT H thing and 
all ;-)  ) you've messaed around with ADAM, right?  Can be on WinXP, Server 2003 - 
create multiple instances of an AD structure, but more like an AD-lite?
 
Rick Kingslan  MCSE, MCSA, MCT
Microsoft MVP - Active Directory
Associate Expert
Expert Zone - www.microsoft.com/windowsxp/expertzone
  




From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Roger Seielstad
Sent: Wednesday, July 09, 2003 6:25 AM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Identity Management using AD


WRT H, isn't ADAM an Win2k3 'forest'? If so, this isn't an issue, right?
 
 

-- 
Roger D. Seielstad - MTS MCSE MS-MVP 
Sr. Systems Administrator 
Inovis Inc. 

-Original Message-
From: Rick Kingslan [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, July 08, 2003 10:12 PM
To: [EMAIL PROTECTED]
Subject: RE: [ActiveDir] Identity Management using AD


Glenn, 
 
Interesting questions, and I'd like to take a shot at lending an opinion on 
some of these points.  Firstly, privacy seems to have become a trure art form in the 
States.  From Graham-Leach-Bliley to HIPPA, we're regulated to the n-th degree.  I'm 
not sure if it's good or bad - but it's something to be aware of.  Then, to the other 
extreme - the Higher Educational system where the 1st Amendment meets rational thought 
and security. ;-)
 
a) I agree 100%  I think AD is a very well designed store for this type of 
storage - given that triple-A is available out of the box (authorization, 
authentication, auditing)
b) True - fairly static - not changing much.  Just enough to keep the Identity 
portion in place.
c) Nope - see D
d) ADAM - Active Directory Application Mode.  Synching available, greater 
level with MMS (MIIS??) multiple instances and truly designed for the application 
depository
e) Joe is going to be the man to answer this - he's been doing the massive 
number management function - though I don't think to this number. ;-)
f) Passport (and to some degree, rightly so) has been beat up pretty badly  
However, in your environment, Passport may be more viable than how it is being 
leveraged by MS
g)  Heh - layering these things is possible, though it can get hairy to 
manage.  Mapping of certs to names / objects, expansion of schema for new funtion to 
handle biometrics, and the smart card option is all pretty good - but smart card is 
going to leverage certs to some degree at some level  Not knowing what price level / 
sensitivity of data / regulations you are delaing with makes it a bit hard for me to 
suggest anything, but any layering is obviously going to raise the price becasue of 
the complexity / added hardware / software and added processor for keyed type solutions
h) Can't say that I've run into any or know of anyone that has (well - not 
completely true I know Gary Olsen with HP, and he ran into the KCC issue mentioned in 
a moment) - obviously, they are there.  Microsoft claims to have tested to billions of 
objects - and I have no reason to not believe this to be true.  The KCC topology (KCC 
cannot work if (1 + #Domains) x sites^2  100,000) issue of Windows 2000 does indicate 
that there are issues here and there.  They get fixed, but usually are big fixes.  In 
the case of the KCC issue, it's fixed in Server 2003, but only once you get to 2003 
Forest Functional mode.  That's a big move.
i) Because it's there.  Oh, wait!  That's for mountains.  never 
mind.
 
Rick Kingslan  MCSE, MCSA, MCT
Microsoft MVP - Active Directory
Associate Expert
Expert Zone - www.microsoft.com/windowsxp/expertzone
  




From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Glenn Corbett
Sent: Tuesday, July 08, 2003 6:36 PM
To: [EMAIL PROTECTED]
Subject: Re: [ActiveDir] Identity Management using AD


Thanks Todd.
 
At the moment, we arent hugely concerned about putting *some* privacy 
information into AD

RE: [ActiveDir] Identity Management using AD

2003-07-09 Thread Roger Seielstad
Title: Message



WRT = 
"with regards to" What's the matter? Can't keep up with all the 
TLA's?[1]

I 
haven't played with ADAM, but have done a bit of reading. I was assuming, 
probably incorrectly, that it would only function in the full native mode/2003 
Forest mode. It doesn't seem to make sense for a product like this to be built 
to support downlevel DC's.
-- 
Roger D. Seielstad - 
MTS MCSE MS-MVP Sr. Systems Administrator Inovis Inc. 
[1] 
Three Letter Acronyms

  
  -Original Message-From: Rick Kingslan 
  [mailto:[EMAIL PROTECTED] Sent: Wednesday, July 09, 2003 9:21 
  AMTo: [EMAIL PROTECTED]Subject: RE: 
  [ActiveDir] Identity Management using AD
  Roger,
  
  I'm not sure that I follow.. Firstly, the 
  acronym might have thrown me off - I haven't seen this one. 'WRT H' 
  means?
  
  And, to speculate, (seeing as I might be missing 
  information with the WRT H thing and all ;-) ) you've messaed around 
  with ADAM, right? Can be on WinXP, Server 2003 - create multiple 
  instances of an AD structure, but more like an AD-lite?
  
  
  Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active 
  DirectoryAssociate ExpertExpert Zone - 
  www.microsoft.com/windowsxp/expertzone 
  
  
  From: [EMAIL PROTECTED] 
  [mailto:[EMAIL PROTECTED] On Behalf Of Roger 
  SeielstadSent: Wednesday, July 09, 2003 6:25 AMTo: 
  '[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity 
  Management using AD
  
  WRT 
  H, isn't ADAM an Win2k3 'forest'? If so, this isn't an issue, 
  right?
  
  
  -- 
  Roger D. Seielstad 
  - MTS MCSE MS-MVP Sr. Systems Administrator Inovis Inc. 
  
  

-Original Message-From: Rick Kingslan 
[mailto:[EMAIL PROTECTED] Sent: Tuesday, July 08, 2003 10:12 
PMTo: [EMAIL PROTECTED]Subject: RE: 
[ActiveDir] Identity Management using AD
Glenn, 

Interesting questions, and I'd like to take a shot at 
lending an opinion on some of these points. Firstly, privacy seems to 
have become a trure art form in the States. From Graham-Leach-Bliley 
to HIPPA, we're regulated to the n-th degree. I'm not sure if it's 
good or bad - but it's something to be aware of. Then, to the other 
extreme - the Higher Educationalsystem where the 1st Amendment meets 
rational thought and security. ;-)

a) I agree 100% I think AD is a very well 
designed store for this type of storage - given that triple-A is available 
out of the box (authorization, authentication, auditing)
b) True - fairly static - not changing much. Just 
enough to keep the Identity portion in place.
c) Nope - see D
d)ADAM - Active Directory Application Mode. 
Synching available, greater level with MMS (MIIS??) multiple instances and 
truly designed for the application depository
e) Joe is going to be the man to answer this - he's 
been doing the massive number management function - though I don't think to 
this number. ;-)
f) Passport (and to some degree, rightly so) has been 
beat up pretty badly However, in your environment, Passport may be 
more viable than how it is being leveraged by MS
g) Heh - layering these things is possible, 
though it can get hairy to manage. Mapping of certs to names / 
objects, expansion of schema for new funtion to handle biometrics, and the 
smart card option is all pretty good - but smart card is going to leverage 
certs to some degree at some level Not knowing what price level / 
sensitivity of data / regulations you are delaing with makes it a bit hard 
for me to suggest anything, but any layering is obviously going to raise the 
price becasue of the complexity / added hardware / software and added 
processor for keyed type solutions
h) Can't say that I've run into any or know of anyone 
that has (well - not completely true I know Gary Olsen with HP, and he ran 
into the KCC issue mentioned in a moment)- obviously, they are 
there. Microsoft claims to have tested to billions of objects - and I 
have no reason to not believe this to be true. TheKCC 
topology(KCC cannot work if (1 + #Domains) x sites^2  100,000) 
issue of Windows 2000 does indicate that there are issues here and 
there. They get fixed, but usually are big fixes. In the case of 
the KCC issue, it's fixed in Server 2003, but only once you get to 2003 
Forest Functional mode. That's a big move.
i) Because it's there. Oh, wait! That's 
for mountains. never mind.


Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - 
Active DirectoryAssociate ExpertExpert Zone - 
www.microsoft.com/windowsxp/expertzone 



From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of Glenn 
CorbettSent: Tuesday, July 08, 2003 6:36 PMTo: 
[EMAIL PROTECTED]S

RE: [ActiveDir] Identity Management using AD

2003-07-09 Thread Myrick, Todd (NIH/CIT)
Title: Message



http://irm.cit.nih.gov/policy/legislation.html

Here 
is what we have to follow.

Todd

  
  -Original Message-From: Rick Kingslan 
  [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 08, 2003 10:12 
  PMTo: [EMAIL PROTECTED]Subject: RE: 
  [ActiveDir] Identity Management using AD
  Glenn, 
  
  Interesting questions, and I'd like to take a shot at 
  lending an opinion on some of these points. Firstly, privacy seems to 
  have become a trure art form in the States. From Graham-Leach-Bliley to 
  HIPPA, we're regulated to the n-th degree. I'm not sure if it's good or 
  bad - but it's something to be aware of. Then, to the other extreme - 
  the Higher Educationalsystem where the 1st Amendment meets rational 
  thought and security. ;-)
  
  a) I agree 100% I think AD is a very well designed 
  store for this type of storage - given that triple-A is available out of the 
  box (authorization, authentication, auditing)
  b) True - fairly static - not changing much. Just 
  enough to keep the Identity portion in place.
  c) Nope - see D
  d)ADAM - Active Directory Application Mode. 
  Synching available, greater level with MMS (MIIS??) multiple instances and 
  truly designed for the application depository
  e) Joe is going to be the man to answer this - he's been 
  doing the massive number management function - though I don't think to this 
  number. ;-)
  f) Passport (and to some degree, rightly so) has been 
  beat up pretty badly However, in your environment, Passport may be more 
  viable than how it is being leveraged by MS
  g) Heh - layering these things is possible, though 
  it can get hairy to manage. Mapping of certs to names / objects, 
  expansion of schema for new funtion to handle biometrics, and the smart card 
  option is all pretty good - but smart card is going to leverage certs to some 
  degree at some level Not knowing what price level / sensitivity of data 
  / regulations you are delaing with makes it a bit hard for me to suggest 
  anything, but any layering is obviously going to raise the price becasue of 
  the complexity / added hardware / software and added processor for keyed type 
  solutions
  h) Can't say that I've run into any or know of anyone 
  that has (well - not completely true I know Gary Olsen with HP, and he ran 
  into the KCC issue mentioned in a moment)- obviously, they are 
  there. Microsoft claims to have tested to billions of objects - and I 
  have no reason to not believe this to be true. TheKCC 
  topology(KCC cannot work if (1 + #Domains) x sites^2  100,000) issue 
  of Windows 2000 does indicate that there are issues here and there. They 
  get fixed, but usually are big fixes. In the case of the KCC issue, it's 
  fixed in Server 2003, but only once you get to 2003 Forest Functional 
  mode. That's a big move.
  i) Because it's there. Oh, wait! That's 
  for mountains. never mind.
  
  
  Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active 
  DirectoryAssociate ExpertExpert Zone - 
  www.microsoft.com/windowsxp/expertzone 
  
  
  From: [EMAIL PROTECTED] 
  [mailto:[EMAIL PROTECTED] On Behalf Of Glenn 
  CorbettSent: Tuesday, July 08, 2003 6:36 PMTo: 
  [EMAIL PROTECTED]Subject: Re: [ActiveDir] Identity 
  Management using AD
  
  Thanks Todd.
  
  At the moment, we arent hugely concerned about 
  putting *some* privacy information into AD, as this instance of AD will only 
  be for our external clients, and the attribute level ACL's provided by AD 
  should provide enough security to stop certain applications / users from 
  seeing this information. That being said, we are looking into the 
  appropiate laws / leglislation / statutes regarding privacy and the storage of 
  personal information to make sure we are covered from that 
aspect.
  
  I've done the required high level checking, 
  andAD shouldnt have any trouble storing the amount and type of 
  information we require (up to 6-8 million user objects, several thousand 
  groups etc), its really down to the following questions:
  
  a) Is AD an *appropiate* store for this sort of 
  information (my answer would be yes, based on the Authentication / 
  Authorisation provided by AD)
  b) What sorts of information should be stored in 
  AD (I'll be pointing out the often read / rarely written aspects of 
  AD)
  c) for application specific extensions, is this 
  appropiate to store in AD (my current thinking is NO, as I'll end up with 
  several hundred additional user properties, better to store them elsewhere and 
  sync)
  d) in relation to c, if not in AD, then where, 
  and how to keep these disprate databases in sync
  e) What management tools / processes are required 
  to manage a 6-8 million user AD, and what are the associated security 
  implications (eg exposing the admin interfaces to the internet, as opposed to 
  just internal exposure)
  f) What other solutions are available that may be 
  able to provide the Authentication / Authorisation

RE: [ActiveDir] Identity Management using AD

2003-07-09 Thread Rick Kingslan
Title: Message



You're right - I can't keep up with the 
TLA's

As to ADAM - it will run on XP/2003, but does not require 
that the domain be in native mode or forest functional as we're only hosting an 
AD environment for specific purposes - not a full functioning DS with every bell 
and whistle.


Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active 
DirectoryAssociate ExpertExpert Zone - 
www.microsoft.com/windowsxp/expertzone 


From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of Roger 
SeielstadSent: Wednesday, July 09, 2003 9:48 AMTo: 
'[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity 
Management using AD

WRT = 
"with regards to" What's the matter? Can't keep up with all the 
TLA's?[1]

I 
haven't played with ADAM, but have done a bit of reading. I was assuming, 
probably incorrectly, that it would only function in the full native mode/2003 
Forest mode. It doesn't seem to make sense for a product like this to be built 
to support downlevel DC's.
-- 
Roger D. Seielstad - 
MTS MCSE MS-MVP Sr. Systems Administrator Inovis Inc. 
[1] 
Three Letter Acronyms

  
  -Original Message-From: Rick Kingslan 
  [mailto:[EMAIL PROTECTED] Sent: Wednesday, July 09, 2003 9:21 
  AMTo: [EMAIL PROTECTED]Subject: RE: 
  [ActiveDir] Identity Management using AD
  Roger,
  
  I'm not sure that I follow.. Firstly, the 
  acronym might have thrown me off - I haven't seen this one. 'WRT H' 
  means?
  
  And, to speculate, (seeing as I might be missing 
  information with the WRT H thing and all ;-) ) you've messaed around 
  with ADAM, right? Can be on WinXP, Server 2003 - create multiple 
  instances of an AD structure, but more like an AD-lite?
  
  
  Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active 
  DirectoryAssociate ExpertExpert Zone - 
  www.microsoft.com/windowsxp/expertzone 
  
  
  From: [EMAIL PROTECTED] 
  [mailto:[EMAIL PROTECTED] On Behalf Of Roger 
  SeielstadSent: Wednesday, July 09, 2003 6:25 AMTo: 
  '[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity 
  Management using AD
  
  WRT 
  H, isn't ADAM an Win2k3 'forest'? If so, this isn't an issue, 
  right?
  
  
  -- 
  Roger D. Seielstad 
  - MTS MCSE MS-MVP Sr. Systems Administrator Inovis Inc. 
  
  

-Original Message-From: Rick Kingslan 
[mailto:[EMAIL PROTECTED] Sent: Tuesday, July 08, 2003 10:12 
PMTo: [EMAIL PROTECTED]Subject: RE: 
[ActiveDir] Identity Management using AD
Glenn, 

Interesting questions, and I'd like to take a shot at 
lending an opinion on some of these points. Firstly, privacy seems to 
have become a trure art form in the States. From Graham-Leach-Bliley 
to HIPPA, we're regulated to the n-th degree. I'm not sure if it's 
good or bad - but it's something to be aware of. Then, to the other 
extreme - the Higher Educationalsystem where the 1st Amendment meets 
rational thought and security. ;-)

a) I agree 100% I think AD is a very well 
designed store for this type of storage - given that triple-A is available 
out of the box (authorization, authentication, auditing)
b) True - fairly static - not changing much. Just 
enough to keep the Identity portion in place.
c) Nope - see D
d)ADAM - Active Directory Application Mode. 
Synching available, greater level with MMS (MIIS??) multiple instances and 
truly designed for the application depository
e) Joe is going to be the man to answer this - he's 
been doing the massive number management function - though I don't think to 
this number. ;-)
f) Passport (and to some degree, rightly so) has been 
beat up pretty badly However, in your environment, Passport may be 
more viable than how it is being leveraged by MS
g) Heh - layering these things is possible, 
though it can get hairy to manage. Mapping of certs to names / 
objects, expansion of schema for new funtion to handle biometrics, and the 
smart card option is all pretty good - but smart card is going to leverage 
certs to some degree at some level Not knowing what price level / 
sensitivity of data / regulations you are delaing with makes it a bit hard 
for me to suggest anything, but any layering is obviously going to raise the 
price becasue of the complexity / added hardware / software and added 
processor for keyed type solutions
h) Can't say that I've run into any or know of anyone 
that has (well - not completely true I know Gary Olsen with HP, and he ran 
into the KCC issue mentioned in a moment)- obviously, they are 
there. Microsoft claims to have tested to billions of objects - and I 
have no reason to not believe this to be true. TheKCC 
topology(KCC cannot work if (1 + #Domains) x sites^2  100,000) 
issue of Windows 2000 does indicate that there are i

RE: [ActiveDir] Identity Management using AD

2003-07-09 Thread Rick Kingslan
Title: Message



Todd,

And sorry for you, I am. I've had to look through 
much of this in my time, and - with all due respect - it is truly a wonder that 
this beautiful country of ours gets anything accomplished at all. Yes, 
Freedom does have its price - and its paid for in miles of red 
tape.

Silly, quite actually.


Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active 
DirectoryAssociate ExpertExpert Zone - 
www.microsoft.com/windowsxp/expertzone 


From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of Myrick, Todd 
(NIH/CIT)Sent: Wednesday, July 09, 2003 10:39 AMTo: 
'[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity 
Management using AD

http://irm.cit.nih.gov/policy/legislation.html

Here 
is what we have to follow.

Todd

  
  -Original Message-From: Rick Kingslan 
  [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 08, 2003 10:12 
  PMTo: [EMAIL PROTECTED]Subject: RE: 
  [ActiveDir] Identity Management using AD
  Glenn, 
  
  Interesting questions, and I'd like to take a shot at 
  lending an opinion on some of these points. Firstly, privacy seems to 
  have become a trure art form in the States. From Graham-Leach-Bliley to 
  HIPPA, we're regulated to the n-th degree. I'm not sure if it's good or 
  bad - but it's something to be aware of. Then, to the other extreme - 
  the Higher Educationalsystem where the 1st Amendment meets rational 
  thought and security. ;-)
  
  a) I agree 100% I think AD is a very well designed 
  store for this type of storage - given that triple-A is available out of the 
  box (authorization, authentication, auditing)
  b) True - fairly static - not changing much. Just 
  enough to keep the Identity portion in place.
  c) Nope - see D
  d)ADAM - Active Directory Application Mode. 
  Synching available, greater level with MMS (MIIS??) multiple instances and 
  truly designed for the application depository
  e) Joe is going to be the man to answer this - he's been 
  doing the massive number management function - though I don't think to this 
  number. ;-)
  f) Passport (and to some degree, rightly so) has been 
  beat up pretty badly However, in your environment, Passport may be more 
  viable than how it is being leveraged by MS
  g) Heh - layering these things is possible, though 
  it can get hairy to manage. Mapping of certs to names / objects, 
  expansion of schema for new funtion to handle biometrics, and the smart card 
  option is all pretty good - but smart card is going to leverage certs to some 
  degree at some level Not knowing what price level / sensitivity of data 
  / regulations you are delaing with makes it a bit hard for me to suggest 
  anything, but any layering is obviously going to raise the price becasue of 
  the complexity / added hardware / software and added processor for keyed type 
  solutions
  h) Can't say that I've run into any or know of anyone 
  that has (well - not completely true I know Gary Olsen with HP, and he ran 
  into the KCC issue mentioned in a moment)- obviously, they are 
  there. Microsoft claims to have tested to billions of objects - and I 
  have no reason to not believe this to be true. TheKCC 
  topology(KCC cannot work if (1 + #Domains) x sites^2  100,000) issue 
  of Windows 2000 does indicate that there are issues here and there. They 
  get fixed, but usually are big fixes. In the case of the KCC issue, it's 
  fixed in Server 2003, but only once you get to 2003 Forest Functional 
  mode. That's a big move.
  i) Because it's there. Oh, wait! That's 
  for mountains. never mind.
  
  
  Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active 
  DirectoryAssociate ExpertExpert Zone - 
  www.microsoft.com/windowsxp/expertzone 
  
  
  From: [EMAIL PROTECTED] 
  [mailto:[EMAIL PROTECTED] On Behalf Of Glenn 
  CorbettSent: Tuesday, July 08, 2003 6:36 PMTo: 
  [EMAIL PROTECTED]Subject: Re: [ActiveDir] Identity 
  Management using AD
  
  Thanks Todd.
  
  At the moment, we arent hugely concerned about 
  putting *some* privacy information into AD, as this instance of AD will only 
  be for our external clients, and the attribute level ACL's provided by AD 
  should provide enough security to stop certain applications / users from 
  seeing this information. That being said, we are looking into the 
  appropiate laws / leglislation / statutes regarding privacy and the storage of 
  personal information to make sure we are covered from that 
aspect.
  
  I've done the required high level checking, 
  andAD shouldnt have any trouble storing the amount and type of 
  information we require (up to 6-8 million user objects, several thousand 
  groups etc), its really down to the following questions:
  
  a) Is AD an *appropiate* store for this sort of 
  information (my answer would be yes, based on the Authentication / 
  Authorisation provided by AD)
  b) What sorts of information should be stored in 
  AD (I'll be pointing out the often read / rarely written aspects of 
  AD)
  c

RE: [ActiveDir] Identity Management using AD

2003-07-09 Thread Jackson Shaw
Title: Message








Were going
to make the MV writeable











From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
Behalf Of Myrick, Todd (NIH/CIT)
Sent: Tuesday, July 08, 2003 7:12 AM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Identity
Management using AD







We are in the process of evaluating MIIS
here, and AD is currently our source for authentication information, for
Enterprise application, we are using a custom database running on Critical Path
to sync with other application directories, and get a metaview of the
information for identity management. Currently no one allows the metaview
write access anywhere.











I hope our testing and subsequent
deployment will allow for a more standardized approach like what was described
below.











To build on what Gil wrote, The
reason why SQL server was used to store identity information, was probably
because it was a metaview of all the relevant data needed to construct an
employee including privacy information. Active Directory doesn't need
access to privacy information (SSN#, DOB, etc) nor do many LDAP
applications. The nice thing about MIIS, is that it can create that
metaview for you and store it in a SQL server. So if your privacy
information is only stored in the HR system, and Payroll, Then you can set
ACL's on the info so only those systems get that info.











If you are getting into directories for
both network access and Enterprise Resource and Application use, I suggest
subscribing to the Burton Group papers on Enterprise
directory, and constructing your architecture based on some of their
principals. Now if we could only find a group willing to figure out the
Laws of directories we would be golden... Maybe Murphy is already doing them.











Todd





-Original Message-
From: Gil Kirkpatrick
[mailto:[EMAIL PROTECTED] 
Sent: Monday, July 07, 2003 5:30 PM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Identity
Management using AD



MSFT internally uses SQL Server as the
authoritative store for identity information, and populates AD from that.





-Original Message-
From: Glenn Corbett
[mailto:[EMAIL PROTECTED] 
Sent: Thursday, July 03, 2003 7:00 AM
To: [EMAIL PROTECTED]
Subject: [ActiveDir] Identity
Management using AD



All,











We are in the process of redefining our Internet-enabled
applications with a view to a centralised customer/client database. There
has been quite a bit of discussion regarding using AD as this customer
store, since AD will already be in this environment.











I'm a bit hesitant to recommend vanilla AD for
this task, however I can see a number of benefits to this approach, as the
support monkeys can manage the entire environment using the same tools they use
to manage the production environment (ADUC etc).











I've been reading up on the information regarding MIIS (what
little there is), and can see some potential for a configuration such as this,
eg:











- Use AD to store the core customer information
(user name, password, basic details)





- Use ADAM or SQL (or whatever) for each application to
store application specific extensions (so I don't end up with a blown out
schema in AD with thousands of additional props for user objects)





- Use MIIS as the Authentication / Identity management front
end, and use it to sync these disparate databases to ensure some semblance of
sameness between them.





- Also use some of the MIIS features such as provisioning
etc to ease the management overhead.











Applications could use AD to authenticate the customer
coming in, and then use their ADAM database to house the application specific
information they need.











We could possibly then use MIIS to backchannel
into the production AD system, so that corporate users can gain access to these
Internet applications without requiring multiple accounts.











This is all just brainstorming at the moment, however (as
usual), I need to come up with some sort of design by next week (gotta love
being given lots of time *grin*). Having not actually got my hands on
MIIS, this could be completely unfeasible. Other options are a custom
database for the customer store, or some other existing product.











Has anyone been down this road before, and could share some
insights / resources ?











Thanks











Glenn
































Re: [ActiveDir] Identity Management using AD

2003-07-09 Thread jim . katoe
Title: Message



ADAM does not include a kerberos or NTLM subsystem, so security is limited. --Sent from my BlackBerry Wireless Handheld - Original Message - From: ActiveDir-owner Sent: 07/09/2003 08:03 PM To: [EMAIL PROTECTED] Subject: RE: [ActiveDir] Identity Management using AD
You're right - I can't keep up with the
TLA's

As to ADAM - it will run on XP/2003, but does not require
that the domain be in native mode or forest functional as we're only hosting an
AD environment for specific purposes - not a full functioning DS with every bell
and whistle.


Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active
DirectoryAssociate ExpertExpert Zone -
www.microsoft.com/windowsxp/expertzone 


From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Roger
SeielstadSent: Wednesday, July 09, 2003 9:48 AMTo:
'[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity
Management using AD

WRT =
"with regards to" What's the matter? Can't keep up with all the
TLA's?[1]

I
haven't played with ADAM, but have done a bit of reading. I was assuming,
probably incorrectly, that it would only function in the full native mode/2003
Forest mode. It doesn't seem to make sense for a product like this to be built
to support downlevel DC's.
--
Roger D. Seielstad -
MTS MCSE MS-MVP Sr. Systems Administrator Inovis Inc. 
[1]
Three Letter Acronyms

  
  -Original Message-From: Rick Kingslan
  [mailto:[EMAIL PROTECTED] Sent: Wednesday, July 09, 2003 9:21
  AMTo: [EMAIL PROTECTED]Subject: RE:
  [ActiveDir] Identity Management using AD
  Roger,
  
  I'm not sure that I follow.. Firstly, the
  acronym might have thrown me off - I haven't seen this one. 'WRT H'
  means?
  
  And, to speculate, (seeing as I might be missing
  information with the WRT H thing and all ;-) ) you've messaed around
  with ADAM, right? Can be on WinXP, Server 2003 - create multiple
  instances of an AD structure, but more like an AD-lite?
  
  
  Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active
  DirectoryAssociate ExpertExpert Zone -
  www.microsoft.com/windowsxp/expertzone 
  
  
  From: [EMAIL PROTECTED]
  [mailto:[EMAIL PROTECTED] On Behalf Of Roger
  SeielstadSent: Wednesday, July 09, 2003 6:25 AMTo:
  '[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity
  Management using AD
  
  WRT
  H, isn't ADAM an Win2k3 'forest'? If so, this isn't an issue,
  right?
  
  
  --
  Roger D. Seielstad
  - MTS MCSE MS-MVP Sr. Systems Administrator Inovis Inc.
  
  

-Original Message-From: Rick Kingslan
[mailto:[EMAIL PROTECTED] Sent: Tuesday, July 08, 2003 10:12
PMTo: [EMAIL PROTECTED]Subject: RE:
[ActiveDir] Identity Management using AD
Glenn, 

Interesting questions, and I'd like to take a shot at
lending an opinion on some of these points. Firstly, privacy seems to
have become a trure art form in the States. From Graham-Leach-Bliley
to HIPPA, we're regulated to the n-th degree. I'm not sure if it's
good or bad - but it's something to be aware of. Then, to the other
extreme - the Higher Educationalsystem where the 1st Amendment meets
rational thought and security. ;-)

a) I agree 100% I think AD is a very well
designed store for this type of storage - given that triple-A is available
out of the box (authorization, authentication, auditing)
b) True - fairly static - not changing much. Just
enough to keep the Identity portion in place.
c) Nope - see D
d)ADAM - Active Directory Application Mode.
Synching available, greater level with MMS (MIIS??) multiple instances and
truly designed for the application depository
e) Joe is going to be the man to answer this - he's
been doing the massive number management function - though I don't think to
this number. ;-)
f) Passport (and to some degree, rightly so) has been
beat up pretty badly However, in your environment, Passport may be
more viable than how it is being leveraged by MS
g) Heh - layering these things is possible,
though it can get hairy to manage. Mapping of certs to names /
objects, expansion of schema for new funtion to handle biometrics, and the
smart card option is all pretty good - but smart card is going to leverage
certs to some degree at some level Not knowing what price level /
sensitivity of data / regulations you are delaing with makes it a bit hard
for me to suggest anything, but any layering is obviously going to raise the
price becasue of the complexity / added hardware / software and added
processor for keyed type solutions
h) Can't say that I've run into any or know of anyone
that has (well - not completely true I know Gary Olsen with HP, and he ran
into the KCC issue mentioned in a moment)- obviously, they are
there. Microsoft claims to h

RE: [ActiveDir] Identity Management using AD

2003-07-09 Thread Rick Kingslan
Title: Message



I'm not sure that I would say that security is limited - 
authentication TO ADAM isa limited feature - supportspassword 
authentication to the user objects. You can bind as a Windows Principal or 
as an ADAM principal. Password and lockout policy will apply from the 
machine on which ADAM is installed. So ifpolicy isset at your 
Domain level and this is a member server, that's what applies. And, the 
connection for the bind has a signing option and an encryption 
option.

Authorization is available on,and to objects using 
DSACLS for granting and denying permissions. Inheritance works, and the 
effective permissions can be viewed, again with DSACLS.

So, on the surface, it might be easy toconclude that 
the security is limited, but in actuality - the only thing missing is Kerberos 
and NTLM - neither of which is really needed for what ADAM is intended 
for. Hence, AD-lite, not Security-lite.


Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active 
DirectoryAssociate ExpertExpert Zone - 
www.microsoft.com/windowsxp/expertzone 


From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of 
[EMAIL PROTECTED]Sent: Wednesday, July 09, 2003 7:25 
PMTo: ActiveDirSubject: Re: [ActiveDir] Identity 
Management using AD

ADAM does not include a kerberos or NTLM subsystem, so security is 
limited. --Sent from my BlackBerry 
Wireless Handheld


 - Original Message - From: 
ActiveDir-owner Sent: 07/09/2003 08:03 PM To: 
[EMAIL PROTECTED] Subject: RE: 
[ActiveDir] Identity Management using AD
You're right - I can't keep up with the 
TLA's

As to ADAM - it will run on XP/2003, but does not require 
that the domain be in native mode or forest functional as we're only hosting an 
AD environment for specific purposes - not a full functioning DS with every bell 
and whistle.


Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active 
DirectoryAssociate ExpertExpert Zone - 
www.microsoft.com/windowsxp/expertzone 


From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of Roger 
SeielstadSent: Wednesday, July 09, 2003 9:48 AMTo: 
'[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity 
Management using AD

WRT = 
"with regards to" What's the matter? Can't keep up with all the 
TLA's?[1]

I 
haven't played with ADAM, but have done a bit of reading. I was assuming, 
probably incorrectly, that it would only function in the full native mode/2003 
Forest mode. It doesn't seem to make sense for a product like this to be built 
to support downlevel DC's.
-- 
Roger D. Seielstad - 
MTS MCSE MS-MVP Sr. Systems Administrator Inovis Inc. 
[1] 
Three Letter Acronyms

  
  -Original Message-From: Rick Kingslan 
  [mailto:[EMAIL PROTECTED] Sent: Wednesday, July 09, 2003 9:21 
  AMTo: [EMAIL PROTECTED]Subject: RE: 
  [ActiveDir] Identity Management using AD
  Roger,
  
  I'm not sure that I follow.. Firstly, the 
  acronym might have thrown me off - I haven't seen this one. 'WRT H' 
  means?
  
  And, to speculate, (seeing as I might be missing 
  information with the WRT H thing and all ;-) ) you've messaed around 
  with ADAM, right? Can be on WinXP, Server 2003 - create multiple 
  instances of an AD structure, but more like an AD-lite?
  
  
  Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active 
  DirectoryAssociate ExpertExpert Zone - 
  www.microsoft.com/windowsxp/expertzone 
  
  
  From: [EMAIL PROTECTED] 
  [mailto:[EMAIL PROTECTED] On Behalf Of Roger 
  SeielstadSent: Wednesday, July 09, 2003 6:25 AMTo: 
  '[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity 
  Management using AD
  
  WRT 
  H, isn't ADAM an Win2k3 'forest'? If so, this isn't an issue, 
  right?
  
  
  -- 
  Roger D. Seielstad 
  - MTS MCSE MS-MVP Sr. Systems Administrator Inovis Inc. 
  
  

-Original Message-From: Rick Kingslan 
[mailto:[EMAIL PROTECTED] Sent: Tuesday, July 08, 2003 10:12 
PMTo: [EMAIL PROTECTED]Subject: RE: 
[ActiveDir] Identity Management using AD
Glenn, 

Interesting questions, and I'd like to take a shot at 
lending an opinion on some of these points. Firstly, privacy seems to 
have become a trure art form in the States. From Graham-Leach-Bliley 
to HIPPA, we're regulated to the n-th degree. I'm not sure if it's 
good or bad - but it's something to be aware of. Then, to the other 
extreme - the Higher Educationalsystem where the 1st Amendment meets 
rational thought and security. ;-)

a) I agree 100% I think AD is a very well 
designed store for this type of storage - given that triple-A is available 
out of the box (authorization, authentication, auditing)
b) True - fairly static - not changing much. Just 
enough to keep the Identity portion in place.
c) Nope - see D
d)ADAM - Active Directory Application Mode. 
Synching available, gre

RE: [ActiveDir] Identity Management using AD

2003-07-08 Thread Myrick, Todd (NIH/CIT)
Title: Message



We are 
in the process of evaluating MIIS here, and AD is currently our source for 
authentication information, for Enterprise application, we are using a custom 
database running on Critical Path to sync with other application directories, 
and get a metaview of the information for identity management. Currently 
no one allows the metaview write access anywhere.

I hope 
our testing and subsequent deployment will allow for a more standardized 
approach like what was described below.

To 
build on what Gil wrote, The reason why SQL server was used to store 
identity information, was probably because it was a metaview of all the relevant 
data needed to construct an employee including privacy information. Active 
Directory doesn't need access to privacy information (SSN#, DOB, etc) nor do 
many LDAP applications. The nice thing about MIIS, is that it can create 
that metaview for you and store it in a SQL server. So if your privacy 
information is only stored in the HR system, and Payroll, Then you can set ACL's 
on the info so only those systems get that info.

If you 
are getting into directories for both network access and Enterprise Resource and 
Application use, I suggest subscribing to the Burton Group papers on Enterprise 
directory, and constructing your architecture based on some of their 
principals. Now if we could only find a group willing to figure out the 
Laws of directories we would be golden... Maybe Murphy is already doing 
them.

Todd

  
  -Original Message-From: Gil Kirkpatrick 
  [mailto:[EMAIL PROTECTED] Sent: Monday, July 07, 2003 5:30 
  PMTo: '[EMAIL PROTECTED]'Subject: RE: 
  [ActiveDir] Identity Management using AD
  MSFT 
  internally uses SQL Server as the authoritative store for identity 
  information, and populates AD from that.
  

-Original Message-From: Glenn Corbett 
[mailto:[EMAIL PROTECTED] Sent: Thursday, July 03, 2003 
7:00 AMTo: [EMAIL PROTECTED]Subject: 
[ActiveDir] Identity Management using AD
All,

We are in the process of redefining our 
Internet-enabled applications with a view to a centralised customer/client 
database. There has been quite a bit of discussion regarding using AD 
as this "customer store", since AD will already be in this 
environment.

I'm a bit hesitant to recommend "vanilla" AD 
for this task, however I can see a number of benefits to this approach, as 
the support monkeys can manage the entire environment using the same tools 
they use to manage the production environment (ADUC etc).

I've been reading up on the information 
regarding MIIS (what little there is), and can see some potential for a 
configuration such as this, eg:

- Use AD to store the "core" customer 
information (user name, password, basic details)
- Use ADAM or SQL (or whatever) for each 
application to store application specific extensions (so I don't end up with 
a blown out schema in AD with thousands of additional props for user 
objects)
- Use MIIS as the Authentication / Identity 
management front end, and use it to sync these disparate databases to ensure 
some semblance of "sameness" between them.
- Also use some of the MIIS features such as 
provisioning etc to ease the management overhead.

Applications could use AD to authenticate the 
customer coming in, and then use their ADAM database to house the 
application specific information they need.

We could possibly then use MIIS to 
"backchannel" into the production AD system, so that corporate users can 
gain access to these Internet applications without requiring multiple 
accounts.

This is all just brainstorming at the moment, 
however (as usual), I need to come up with some sort of design by next week 
(gotta love being given lots of time *grin*). Having not actually got 
my hands on MIIS, this could be completely unfeasible. Other options 
are a custom database for the "customer store", or some other existing 
product.

Has anyone been down this road before, and 
could share some insights / resources ?

Thanks

Glenn





RE: [ActiveDir] Identity Management using AD

2003-07-08 Thread Thommes, Michael M.
Title: Message



I've 
been told that MIIS is really just MMS 3.0 renamed. The description of the 
software would seem to indicate so. Is this true?

Mike 
Thommes
Argonne National Laboratory

  -Original Message-From: Myrick, Todd (NIH/CIT) 
  [mailto:[EMAIL PROTECTED]Sent: Tuesday, July 08, 2003 9:12 
  AMTo: '[EMAIL PROTECTED]'Subject: RE: 
  [ActiveDir] Identity Management using AD
  We 
  are in the process of evaluating MIIS here, and AD is currently our source for 
  authentication information, for Enterprise application, we are using a custom 
  database running on Critical Path to sync with other application directories, 
  and get a metaview of the information for identity management. Currently 
  no one allows the metaview write access anywhere.
  
  I 
  hope our testing and subsequent deployment will allow for a more standardized 
  approach like what was described below.
  
  To 
  build on what Gil wrote, The reason why SQL server was used to store 
  identity information, was probably because it was a metaview of all the 
  relevant data needed to construct an employee including privacy 
  information. Active Directory doesn't need access to privacy information 
  (SSN#, DOB, etc) nor do many LDAP applications. The nice thing about 
  MIIS, is that it can create that metaview for you and store it in a SQL 
  server. So if your privacy information is only stored in the HR system, 
  and Payroll, Then you can set ACL's on the info so only those systems get that 
  info.
  
  If 
  you are getting into directories for both network access and Enterprise 
  Resource and Application use, I suggest subscribing to the Burton Group papers 
  on Enterprise directory, and constructing your architecture based on some of 
  their principals. Now if we could only find a group willing to figure 
  out the Laws of directories we would be golden... Maybe Murphy is already 
  doing them.
  
  Todd
  

-Original Message-From: Gil 
Kirkpatrick [mailto:[EMAIL PROTECTED] Sent: Monday, July 07, 2003 
5:30 PMTo: '[EMAIL PROTECTED]'Subject: RE: 
[ActiveDir] Identity Management using AD
MSFT internally uses SQL Server as the authoritative store for 
identity information, and populates AD from that.

  
  -Original Message-From: Glenn 
  Corbett [mailto:[EMAIL PROTECTED] Sent: Thursday, July 
  03, 2003 7:00 AMTo: 
  [EMAIL PROTECTED]Subject: [ActiveDir] Identity 
  Management using AD
  All,
  
  We are in the process of redefining our 
  Internet-enabled applications with a view to a centralised customer/client 
  database. There has been quite a bit of discussion regarding using 
  AD as this "customer store", since AD will already be in this 
  environment.
  
  I'm a bit hesitant to recommend "vanilla" AD 
  for this task, however I can see a number of benefits to this approach, as 
  the support monkeys can manage the entire environment using the same tools 
  they use to manage the production environment (ADUC etc).
  
  I've been reading up on the information 
  regarding MIIS (what little there is), and can see some potential for a 
  configuration such as this, eg:
  
  - Use AD to store the "core" customer 
  information (user name, password, basic details)
  - Use ADAM or SQL (or whatever) for each 
  application to store application specific extensions (so I don't end up 
  with a blown out schema in AD with thousands of additional props for user 
  objects)
  - Use MIIS as the Authentication / Identity 
  management front end, and use it to sync these disparate databases to 
  ensure some semblance of "sameness" between them.
  - Also use some of the MIIS features such as 
  provisioning etc to ease the management overhead.
  
  Applications could use AD to authenticate the 
  customer coming in, and then use their ADAM database to house the 
  application specific information they need.
  
  We could possibly then use MIIS to 
  "backchannel" into the production AD system, so that corporate users can 
  gain access to these Internet applications without requiring multiple 
  accounts.
  
  This is all just brainstorming at the moment, 
  however (as usual), I need to come up with some sort of design by next 
  week (gotta love being given lots of time *grin*). Having not 
  actually got my hands on MIIS, this could be completely unfeasible. 
  Other options are a custom database for the "customer store", or some 
  other existing product.
  
  Has anyone been down this road before, and 
  could share some insights / resources ?
  
  Thanks
  
  Glenn
  
  
  


RE: [ActiveDir] Identity Management using AD

2003-07-08 Thread Gil Kirkpatrick
Title: Message



Mike,

You're 
basically correct, although the renaming of MMS is accompanied by a broader IM 
strategy incorporating other products, services, and partnerships. MSFT is going 
to spell it out at Catlyst this week (today I think). IM has become a strategic 
issue for MSFT, partly because IM provides a more sellable benefit that Active 
Directory can provide to customers. "Improved TCO" wasn't a strong enough reason 
for getting people to make the leap to AD.

-gil

  
  -Original Message-From: Thommes, Michael 
  M. [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 08, 2003 8:57 
  AMTo: [EMAIL PROTECTED]Subject: RE: 
  [ActiveDir] Identity Management using AD
  I've 
  been told that MIIS is really just MMS 3.0 renamed. The description of 
  the software would seem to indicate so. Is this 
true?
  
  Mike 
  Thommes
  Argonne National Laboratory
  
-Original Message-From: Myrick, Todd (NIH/CIT) 
[mailto:[EMAIL PROTECTED]Sent: Tuesday, July 08, 2003 9:12 
AMTo: '[EMAIL PROTECTED]'Subject: RE: 
[ActiveDir] Identity Management using AD
We 
are in the process of evaluating MIIS here, and AD is currently our source 
for authentication information, for Enterprise application, we are using a 
custom database running on Critical Path to sync with other application 
directories, and get a metaview of the information for identity 
management. Currently no one allows the metaview write access 
anywhere.

I 
hope our testing and subsequent deployment will allow for a more 
standardized approach like what was described below.

To 
build on what Gil wrote, The reason why SQL server was used to store 
identity information, was probably because it was a metaview of all the 
relevant data needed to construct an employee including privacy 
information. Active Directory doesn't need access to privacy 
information (SSN#, DOB, etc) nor do many LDAP applications. The nice 
thing about MIIS, is that it can create that metaview for you and store it 
in a SQL server. So if your privacy information is only stored in the 
HR system, and Payroll, Then you can set ACL's on the info so only those 
systems get that info.

If 
you are getting into directories for both network access and Enterprise 
Resource and Application use, I suggest subscribing to the Burton Group 
papers on Enterprise directory, and constructing your architecture based on 
some of their principals. Now if we could only find a group willing to 
figure out the Laws of directories we would be golden... Maybe Murphy is 
already doing them.

Todd

  
  -Original Message-From: Gil 
  Kirkpatrick [mailto:[EMAIL PROTECTED] Sent: Monday, July 07, 
  2003 5:30 PMTo: 
  '[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity 
  Management using AD
  MSFT internally uses SQL Server as the authoritative store for 
  identity information, and populates AD from that.
  

-Original Message-From: Glenn 
Corbett [mailto:[EMAIL PROTECTED] Sent: Thursday, 
July 03, 2003 7:00 AMTo: 
[EMAIL PROTECTED]Subject: [ActiveDir] Identity 
Management using AD
All,

We are in the process of redefining our 
Internet-enabled applications with a view to a centralised 
customer/client database. There has been quite a bit of discussion 
regarding using AD as this "customer store", since AD will already be in 
this environment.

I'm a bit hesitant to recommend "vanilla" 
AD for this task, however I can see a number of benefits to this 
approach, as the support monkeys can manage the entire environment using 
the same tools they use to manage the production environment (ADUC 
etc).

I've been reading up on the information 
regarding MIIS (what little there is), and can see some potential for a 
configuration such as this, eg:

- Use AD to store the "core" customer 
information (user name, password, basic details)
- Use ADAM or SQL (or whatever) for each 
application to store application specific extensions (so I don't end up 
with a blown out schema in AD with thousands of additional props for 
user objects)
- Use MIIS as the Authentication / Identity 
management front end, and use it to sync these disparate databases to 
ensure some semblance of "sameness" between them.
- Also use some of the MIIS features such 
as provisioning etc to ease the management overhead.

Applications could use AD to authenticate 
the customer coming in, and then use their ADAM database to house the 
application specific information they need

RE: [ActiveDir] Identity Management using AD

2003-07-08 Thread Myrick, Todd (NIH/CIT)
Title: Message



Yes it 
is a new Architecture product from MMicrosoft. 

The 
next question should be does it use IIS?

Todd

  
  -Original Message-From: Thommes, Michael 
  M. [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 08, 2003 11:57 
  AMTo: [EMAIL PROTECTED]Subject: RE: 
  [ActiveDir] Identity Management using AD
  I've 
  been told that MIIS is really just MMS 3.0 renamed. The description of 
  the software would seem to indicate so. Is this 
true?
  
  Mike 
  Thommes
  Argonne National Laboratory
  
-Original Message-From: Myrick, Todd (NIH/CIT) 
[mailto:[EMAIL PROTECTED]Sent: Tuesday, July 08, 2003 9:12 
AMTo: '[EMAIL PROTECTED]'Subject: RE: 
[ActiveDir] Identity Management using AD
We 
are in the process of evaluating MIIS here, and AD is currently our source 
for authentication information, for Enterprise application, we are using a 
custom database running on Critical Path to sync with other application 
directories, and get a metaview of the information for identity 
management. Currently no one allows the metaview write access 
anywhere.

I 
hope our testing and subsequent deployment will allow for a more 
standardized approach like what was described below.

To 
build on what Gil wrote, The reason why SQL server was used to store 
identity information, was probably because it was a metaview of all the 
relevant data needed to construct an employee including privacy 
information. Active Directory doesn't need access to privacy 
information (SSN#, DOB, etc) nor do many LDAP applications. The nice 
thing about MIIS, is that it can create that metaview for you and store it 
in a SQL server. So if your privacy information is only stored in the 
HR system, and Payroll, Then you can set ACL's on the info so only those 
systems get that info.

If 
you are getting into directories for both network access and Enterprise 
Resource and Application use, I suggest subscribing to the Burton Group 
papers on Enterprise directory, and constructing your architecture based on 
some of their principals. Now if we could only find a group willing to 
figure out the Laws of directories we would be golden... Maybe Murphy is 
already doing them.

Todd

  
  -Original Message-From: Gil 
  Kirkpatrick [mailto:[EMAIL PROTECTED] Sent: Monday, July 07, 
  2003 5:30 PMTo: 
  '[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity 
  Management using AD
  MSFT internally uses SQL Server as the authoritative store for 
  identity information, and populates AD from that.
  

-Original Message-From: Glenn 
Corbett [mailto:[EMAIL PROTECTED] Sent: Thursday, 
July 03, 2003 7:00 AMTo: 
[EMAIL PROTECTED]Subject: [ActiveDir] Identity 
Management using AD
All,

We are in the process of redefining our 
Internet-enabled applications with a view to a centralised 
customer/client database. There has been quite a bit of discussion 
regarding using AD as this "customer store", since AD will already be in 
this environment.

I'm a bit hesitant to recommend "vanilla" 
AD for this task, however I can see a number of benefits to this 
approach, as the support monkeys can manage the entire environment using 
the same tools they use to manage the production environment (ADUC 
etc).

I've been reading up on the information 
regarding MIIS (what little there is), and can see some potential for a 
configuration such as this, eg:

- Use AD to store the "core" customer 
information (user name, password, basic details)
- Use ADAM or SQL (or whatever) for each 
application to store application specific extensions (so I don't end up 
with a blown out schema in AD with thousands of additional props for 
user objects)
- Use MIIS as the Authentication / Identity 
management front end, and use it to sync these disparate databases to 
ensure some semblance of "sameness" between them.
- Also use some of the MIIS features such 
as provisioning etc to ease the management overhead.

Applications could use AD to authenticate 
the customer coming in, and then use their ADAM database to house the 
application specific information they need.

We could possibly then use MIIS to 
"backchannel" into the production AD system, so that corporate users can 
gain access to these Internet applications without requiring multiple 
accounts.

This is all just brainstorming at the 
moment, however (as usual), I need to come up with some sort

RE: [ActiveDir] Identity Management using AD

2003-07-08 Thread Duncan, Larry
Title: Message









According to the Technical Overview
of Microsoft Identity Integration Server 2003 whitepaper, MIIS 2003 is
the third major release of Microsoft's metadirectory product. This would mean
that, yes; MIIS is indeed the next version of the MMS product. 



http://www.microsoft.com/windowsserver2003/techinfo/overview/miis.mspx





-Original Message-
From: Myrick, Todd (NIH/CIT)
[mailto:[EMAIL PROTECTED] 
Sent: Tuesday, July 08, 2003 12:02
PM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Identity
Management using AD





Yes it is a new
Architecture product from MMicrosoft. 











The next question should
be does it use IIS?











Todd





-Original
Message-
From: Thommes, Michael M.
[mailto:[EMAIL PROTECTED] 
Sent: Tuesday, July 08, 2003 11:57
AM
To: [EMAIL PROTECTED]
Subject: RE: [ActiveDir] Identity
Management using AD



I've been told that MIIS
is really just MMS 3.0 renamed. The description of the software would
seem to indicate so. Is this true?











Mike Thommes





Argonne National
Laboratory





-Original
Message-
From: Myrick, Todd (NIH/CIT)
[mailto:[EMAIL PROTECTED]
Sent: Tuesday, July 08, 2003 9:12
AM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Identity
Management using AD



We are in the process of
evaluating MIIS here, and AD is currently our source for authentication
information, for Enterprise application, we are using a custom database running
on Critical Path to sync with other application directories, and get a metaview
of the information for identity management. Currently no one allows the
metaview write access anywhere.











I hope our testing and
subsequent deployment will allow for a more standardized approach like what was
described below.











To build on what Gil
wrote, The reason why SQL server was used to store identity information,
was probably because it was a metaview of all the relevant data needed to
construct an employee including privacy information. Active Directory
doesn't need access to privacy information (SSN#, DOB, etc) nor do many LDAP
applications. The nice thing about MIIS, is that it can create that
metaview for you and store it in a SQL server. So if your privacy
information is only stored in the HR system, and Payroll, Then you can set
ACL's on the info so only those systems get that info.











If you are getting into
directories for both network access and Enterprise Resource and Application
use, I suggest subscribing to the Burton Group papers on Enterprise directory,
and constructing your architecture based on some of their principals. Now
if we could only find a group willing to figure out the Laws of directories we
would be golden... Maybe Murphy is already doing them.











Todd





-Original
Message-
From: Gil Kirkpatrick
[mailto:[EMAIL PROTECTED] 
Sent: Monday, July 07, 2003 5:30
PM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Identity
Management using AD



MSFT internally uses SQL
Server as the authoritative store for identity information, and populates AD
from that.





-Original
Message-
From: Glenn Corbett
[mailto:[EMAIL PROTECTED] 
Sent: Thursday, July 03, 2003 7:00
AM
To: [EMAIL PROTECTED]
Subject: [ActiveDir] Identity
Management using AD



All,











We are in the process of redefining
our Internet-enabled applications with a view to a centralised customer/client
database. There has been quite a bit of discussion regarding using AD as
this customer store, since AD will already be in this environment.











I'm a bit hesitant to recommend
vanilla AD for this task, however I can see a number of benefits to
this approach, as the support monkeys can manage the entire environment using
the same tools they use to manage the production environment (ADUC etc).











I've been reading up on the
information regarding MIIS (what little there is), and can see some potential
for a configuration such as this, eg:











- Use AD to store the
core customer information (user name, password, basic details)





- Use ADAM or SQL (or whatever) for
each application to store application specific extensions (so I don't end up with
a blown out schema in AD with thousands of additional props for user objects)





- Use MIIS as the Authentication /
Identity management front end, and use it to sync these disparate databases to
ensure some semblance of sameness between them.





- Also use some of the MIIS features
such as provisioning etc to ease the management overhead.











Applications could use AD to
authenticate the customer coming in, and then use their ADAM database to house
the application specific information they need.











We could possibly then use MIIS to
backchannel into the production AD system, so that corporate users
can gain access to these Internet applications without requiring multiple
accounts.











This is all just brainstorming at
the moment, however (as usual), I need to come up with some

RE: [ActiveDir] Identity Management using AD

2003-07-08 Thread Myrick, Todd (NIH/CIT)
Title: Message



My 
spell checker broke my joke...

I ment 
to say Marchitecture. As in Marketing Architecture.

I 
think the who IIS part is just a bad thing..

Todd

  
  -Original Message-From: Myrick, Todd 
  (NIH/CIT) Sent: Tuesday, July 08, 2003 1:02 PMTo: 
  '[EMAIL PROTECTED]'Subject: RE: [ActiveDir] Identity 
  Management using AD
  Yes 
  it is a new Architecture product from MMicrosoft. 
  
  The 
  next question should be does it use IIS?
  
  Todd
  

-Original Message-From: Thommes, 
Michael M. [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 08, 2003 
11:57 AMTo: [EMAIL PROTECTED]Subject: RE: 
[ActiveDir] Identity Management using AD
I've been told that MIIS is really just MMS 3.0 renamed. The 
description of the software would seem to indicate so. Is this 
true?

Mike Thommes
Argonne National Laboratory

  -Original Message-From: Myrick, Todd (NIH/CIT) 
  [mailto:[EMAIL PROTECTED]Sent: Tuesday, July 08, 2003 9:12 
  AMTo: '[EMAIL PROTECTED]'Subject: RE: 
  [ActiveDir] Identity Management using AD
  We are in the process of evaluating MIIS here, and AD is currently 
  our source for authentication information, for Enterprise application, we 
  are using a custom database running on Critical Path to sync with other 
  application directories, and get a metaview of the information for 
  identity management. Currently no one allows the metaview write 
  access anywhere.
  
  I hope our testing and subsequent deployment will allow for a more 
  standardized approach like what was described below.
  
  To build on what Gil wrote, The reason why SQL server was 
  used to store identity information, was probably because it was a metaview 
  of all the relevant data needed to construct an employee including privacy 
  information. Active Directory doesn't need access to privacy 
  information (SSN#, DOB, etc) nor do many LDAP applications. The nice 
  thing about MIIS, is that it can create that metaview for you and store it 
  in a SQL server. So if your privacy information is only stored in 
  the HR system, and Payroll, Then you can set ACL's on the info so only 
  those systems get that info.
  
  If you are getting into directories for both network access and 
  Enterprise Resource and Application use, I suggest subscribing to the 
  Burton Group papers on Enterprise directory, and constructing your 
  architecture based on some of their principals. Now if we could only 
  find a group willing to figure out the Laws of directories we would be 
  golden... Maybe Murphy is already doing them.
  
  Todd
  

-Original Message-From: Gil 
Kirkpatrick [mailto:[EMAIL PROTECTED] Sent: Monday, July 07, 
2003 5:30 PMTo: 
'[EMAIL PROTECTED]'Subject: RE: [ActiveDir] 
Identity Management using AD
MSFT internally uses SQL Server as the authoritative store for 
identity information, and populates AD from that.

  
  -Original Message-From: Glenn 
  Corbett [mailto:[EMAIL PROTECTED] Sent: Thursday, 
  July 03, 2003 7:00 AMTo: 
  [EMAIL PROTECTED]Subject: [ActiveDir] Identity 
  Management using AD
  All,
  
  We are in the process of redefining our 
  Internet-enabled applications with a view to a centralised 
  customer/client database. There has been quite a bit of 
  discussion regarding using AD as this "customer store", since AD will 
  already be in this environment.
  
  I'm a bit hesitant to recommend "vanilla" 
  AD for this task, however I can see a number of benefits to this 
  approach, as the support monkeys can manage the entire environment 
  using the same tools they use to manage the production environment 
  (ADUC etc).
  
  I've been reading up on the information 
  regarding MIIS (what little there is), and can see some potential for 
  a configuration such as this, eg:
  
  - Use AD to store the "core" customer 
  information (user name, password, basic details)
  - Use ADAM or SQL (or whatever) for each 
  application to store application specific extensions (so I don't end 
  up with a blown out schema in AD with thousands of additional props 
  for user objects)
  - Use MIIS as the Authentication / 
  Identity management front end, and use it to sync these disparate 
  databases to ensure some semblance of "sameness" between 
  them.
  - Also use some of the MIIS features such 
  as provisioning etc to ease the management overhead.
  
  Applications could use AD

Re: [ActiveDir] Identity Management using AD

2003-07-08 Thread Glenn Corbett
Title: Message



Thanks Todd.

At the moment, we arent hugely concerned about 
putting *some* privacy information into AD, as this instance of AD will only be 
for our external clients, and the attribute level ACL's provided by AD should 
provide enough security to stop certain applications / users from seeing this 
information. That being said, we are looking into the appropiate laws / 
leglislation / statutes regarding privacy and the storage of personal 
information to make sure we are covered from that aspect.

I've done the required high level checking, 
andAD shouldnt have any trouble storing the amount and type of information 
we require (up to 6-8 million user objects, several thousand groups etc), its 
really down to the following questions:

a) Is AD an *appropiate* store for this sort of 
information (my answer would be yes, based on the Authentication / Authorisation 
provided by AD)
b) What sorts of information should be stored in AD 
(I'll be pointing out the often read / rarely written aspects of 
AD)
c) for application specific extensions, is this 
appropiate to store in AD (my current thinking is NO, as I'll end up with 
several hundred additional user properties, better to store them elsewhere and 
sync)
d) in relation to c, if not in AD, then where, and 
how to keep these disprate databases in sync
e) What management tools / processes are required 
to manage a 6-8 million user AD, and what are the associated security 
implications (eg exposing the admin interfaces to the internet, as opposed to 
just internal exposure)
f) What other solutions are available that may be 
able to provide the Authentication / Authorisation that is required (mention has 
been made of Passport etc, and how would this tie in with AD - if at 
all)
g) What additional authentication methods can be 
layered on AD to provide additional levels of authentication (Certifications, 
SmartCards, Biometrics etc)- I know AD can do all these, its really how to 
integrate them, and the associated security / management 
implications.
h) What are some of the constraints on AD that 
could be an issue down the track (like the X users in a group problem under 
2k).
i) Why me ?? *grin*

I'm sure Murphy was the first one out with a book 
:P

Glenn


  - Original Message - 
  From: 
  Myrick, Todd 
  (NIH/CIT) 
  To: '[EMAIL PROTECTED]' 
  
  Sent: Wednesday, July 09, 2003 12:11 
  AM
  Subject: RE: [ActiveDir] Identity 
  Management using AD
  
  We 
  are in the process of evaluating MIIS here, and AD is currently our source for 
  authentication information, for Enterprise application, we are using a custom 
  database running on Critical Path to sync with other application directories, 
  and get a metaview of the information for identity management. Currently 
  no one allows the metaview write access anywhere.
  
  I 
  hope our testing and subsequent deployment will allow for a more standardized 
  approach like what was described below.
  
  To 
  build on what Gil wrote, The reason why SQL server was used to store 
  identity information, was probably because it was a metaview of all the 
  relevant data needed to construct an employee including privacy 
  information. Active Directory doesn't need access to privacy information 
  (SSN#, DOB, etc) nor do many LDAP applications. The nice thing about 
  MIIS, is that it can create that metaview for you and store it in a SQL 
  server. So if your privacy information is only stored in the HR system, 
  and Payroll, Then you can set ACL's on the info so only those systems get that 
  info.
  
  If 
  you are getting into directories for both network access and Enterprise 
  Resource and Application use, I suggest subscribing to the Burton Group papers 
  on Enterprise directory, and constructing your architecture based on some of 
  their principals. Now if we could only find a group willing to figure 
  out the Laws of directories we would be golden... Maybe Murphy is already 
  doing them.
  
  Todd
  

-Original Message-From: Gil 
Kirkpatrick [mailto:[EMAIL PROTECTED] Sent: Monday, July 07, 2003 
5:30 PMTo: '[EMAIL PROTECTED]'Subject: RE: 
[ActiveDir] Identity Management using AD
MSFT internally uses SQL Server as the authoritative store for 
identity information, and populates AD from that.

  
  -Original Message-From: Glenn 
  Corbett [mailto:[EMAIL PROTECTED] Sent: Thursday, July 
  03, 2003 7:00 AMTo: 
  [EMAIL PROTECTED]Subject: [ActiveDir] Identity 
  Management using AD
  All,
  
  We are in the process of redefining our 
  Internet-enabled applications with a view to a centralised customer/client 
  database. There has been quite a bit of discussion regarding using 
  AD as this "customer store", since AD will already be in this 
  environment.
  
  I'm a bit hesitant to recommend "vanilla" AD 
  for this task, howeve

RE: [ActiveDir] Identity Management using AD

2003-07-08 Thread Rick Kingslan
Title: Message



Glenn, 

Interesting questions, and I'd like to take a shot at 
lending an opinion on some of these points. Firstly, privacy seems to have 
become a trure art form in the States. From Graham-Leach-Bliley to HIPPA, 
we're regulated to the n-th degree. I'm not sure if it's good or bad - but 
it's something to be aware of. Then, to the other extreme - the Higher 
Educationalsystem where the 1st Amendment meets rational thought and 
security. ;-)

a) I agree 100% I think AD is a very well designed 
store for this type of storage - given that triple-A is available out of the box 
(authorization, authentication, auditing)
b) True - fairly static - not changing much. Just 
enough to keep the Identity portion in place.
c) Nope - see D
d)ADAM - Active Directory Application Mode. 
Synching available, greater level with MMS (MIIS??) multiple instances and truly 
designed for the application depository
e) Joe is going to be the man to answer this - he's been 
doing the massive number management function - though I don't think to this 
number. ;-)
f) Passport (and to some degree, rightly so) has been beat 
up pretty badly However, in your environment, Passport may be more viable 
than how it is being leveraged by MS
g) Heh - layering these things is possible, though it 
can get hairy to manage. Mapping of certs to names / objects, expansion of 
schema for new funtion to handle biometrics, and the smart card option is all 
pretty good - but smart card is going to leverage certs to some degree at some 
level Not knowing what price level / sensitivity of data / regulations you 
are delaing with makes it a bit hard for me to suggest anything, but any 
layering is obviously going to raise the price becasue of the complexity / added 
hardware / software and added processor for keyed type 
solutions
h) Can't say that I've run into any or know of anyone that 
has (well - not completely true I know Gary Olsen with HP, and he ran into the 
KCC issue mentioned in a moment)- obviously, they are there. 
Microsoft claims to have tested to billions of objects - and I have no reason to 
not believe this to be true. TheKCC topology(KCC cannot work 
if (1 + #Domains) x sites^2  100,000) issue of Windows 2000 does indicate 
that there are issues here and there. They get fixed, but usually are big 
fixes. In the case of the KCC issue, it's fixed in Server 2003, but only 
once you get to 2003 Forest Functional mode. That's a big 
move.
i) Because it's there. Oh, wait! That's for 
mountains. never mind.


Rick Kingslan MCSE, MCSA, MCTMicrosoft MVP - Active 
DirectoryAssociate ExpertExpert Zone - 
www.microsoft.com/windowsxp/expertzone 


From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of Glenn 
CorbettSent: Tuesday, July 08, 2003 6:36 PMTo: 
[EMAIL PROTECTED]Subject: Re: [ActiveDir] Identity 
Management using AD

Thanks Todd.

At the moment, we arent hugely concerned about 
putting *some* privacy information into AD, as this instance of AD will only be 
for our external clients, and the attribute level ACL's provided by AD should 
provide enough security to stop certain applications / users from seeing this 
information. That being said, we are looking into the appropiate laws / 
leglislation / statutes regarding privacy and the storage of personal 
information to make sure we are covered from that aspect.

I've done the required high level checking, 
andAD shouldnt have any trouble storing the amount and type of information 
we require (up to 6-8 million user objects, several thousand groups etc), its 
really down to the following questions:

a) Is AD an *appropiate* store for this sort of 
information (my answer would be yes, based on the Authentication / Authorisation 
provided by AD)
b) What sorts of information should be stored in AD 
(I'll be pointing out the often read / rarely written aspects of 
AD)
c) for application specific extensions, is this 
appropiate to store in AD (my current thinking is NO, as I'll end up with 
several hundred additional user properties, better to store them elsewhere and 
sync)
d) in relation to c, if not in AD, then where, and 
how to keep these disprate databases in sync
e) What management tools / processes are required 
to manage a 6-8 million user AD, and what are the associated security 
implications (eg exposing the admin interfaces to the internet, as opposed to 
just internal exposure)
f) What other solutions are available that may be 
able to provide the Authentication / Authorisation that is required (mention has 
been made of Passport etc, and how would this tie in with AD - if at 
all)
g) What additional authentication methods can be 
layered on AD to provide additional levels of authentication (Certifications, 
SmartCards, Biometrics etc)- I know AD can do all these, its really how to 
integrate them, and the associated security / management 
implications.
h) What are some of the constraints on AD that 
could be an issue down the track (like the X

RE: [ActiveDir] Identity Management using AD

2003-07-07 Thread Gil Kirkpatrick
Title: Message



MSFT 
internally uses SQL Server as the authoritative store for identity information, 
and populates AD from that.

  
  -Original Message-From: Glenn Corbett 
  [mailto:[EMAIL PROTECTED] Sent: Thursday, July 03, 2003 
  7:00 AMTo: [EMAIL PROTECTED]Subject: 
  [ActiveDir] Identity Management using AD
  All,
  
  We are in the process of redefining our 
  Internet-enabled applications with a view to a centralised customer/client 
  database. There has been quite a bit of discussion regarding using AD as 
  this "customer store", since AD will already be in this 
  environment.
  
  I'm a bit hesitant to recommend "vanilla" AD for 
  this task, however I can see a number of benefits to this approach, as the 
  support monkeys can manage the entire environment using the same tools they 
  use to manage the production environment (ADUC etc).
  
  I've been reading up on the information regarding 
  MIIS (what little there is), and can see some potential for a configuration 
  such as this, eg:
  
  - Use AD to store the "core" customer information 
  (user name, password, basic details)
  - Use ADAM or SQL (or whatever) for each 
  application to store application specific extensions (so I don't end up with a 
  blown out schema in AD with thousands of additional props for user 
  objects)
  - Use MIIS as the Authentication / Identity 
  management front end, and use it to sync these disparate databases to ensure 
  some semblance of "sameness" between them.
  - Also use some of the MIIS features such as 
  provisioning etc to ease the management overhead.
  
  Applications could use AD to authenticate the 
  customer coming in, and then use their ADAM database to house the application 
  specific information they need.
  
  We could possibly then use MIIS to "backchannel" 
  into the production AD system, so that corporate users can gain access to 
  these Internet applications without requiring multiple accounts.
  
  This is all just brainstorming at the moment, 
  however (as usual), I need to come up with some sort of design by next week 
  (gotta love being given lots of time *grin*). Having not actually got my 
  hands on MIIS, this could be completely unfeasible. Other options are a 
  custom database for the "customer store", or some other existing 
  product.
  
  Has anyone been down this road before, and could 
  share some insights / resources ?
  
  Thanks
  
  Glenn
  
  
  


RE: [ActiveDir] Identity Management using AD

2003-07-07 Thread Jackson Shaw
Title: Message








A lot of new info
on MIIS has been published since the announcements: www.microsoft.com/MIIS



The RTM
software will shortly be available for download from the MSDN Universal web
site and on MSDN Universal CDs in September. 











From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Gil Kirkpatrick
Sent: Monday, July 07, 2003 2:30 PM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Identity
Management using AD







MSFT internally uses SQL Server as the
authoritative store for identity information, and populates AD from that.





-Original Message-
From: Glenn Corbett
[mailto:[EMAIL PROTECTED] 
Sent: Thursday, July 03, 2003 7:00 AM
To: [EMAIL PROTECTED]
Subject: [ActiveDir] Identity
Management using AD



All,











We are in the process of redefining our Internet-enabled
applications with a view to a centralised customer/client database. There
has been quite a bit of discussion regarding using AD as this customer
store, since AD will already be in this environment.











I'm a bit hesitant to recommend vanilla AD for
this task, however I can see a number of benefits to this approach, as the
support monkeys can manage the entire environment using the same tools they use
to manage the production environment (ADUC etc).











I've been reading up on the information regarding MIIS (what
little there is), and can see some potential for a configuration such as this,
eg:











- Use AD to store the core customer information
(user name, password, basic details)





- Use ADAM or SQL (or whatever) for each application to
store application specific extensions (so I don't end up with a blown out
schema in AD with thousands of additional props for user objects)





- Use MIIS as the Authentication / Identity management front
end, and use it to sync these disparate databases to ensure some semblance of
sameness between them.





- Also use some of the MIIS features such as provisioning
etc to ease the management overhead.











Applications could use AD to authenticate the customer
coming in, and then use their ADAM database to house the application specific
information they need.











We could possibly then use MIIS to backchannel
into the production AD system, so that corporate users can gain access to these
Internet applications without requiring multiple accounts.











This is all just brainstorming at the moment, however (as
usual), I need to come up with some sort of design by next week (gotta love
being given lots of time *grin*). Having not actually got my hands on
MIIS, this could be completely unfeasible. Other options are a custom
database for the customer store, or some other existing product.











Has anyone been down this road before, and could share some
insights / resources ?











Thanks











Glenn






























Re: [ActiveDir] Identity Management using AD

2003-07-04 Thread jim . katoe



There is a MS moderated MMS mailing list on yahoo.It has no authentication service or directory of its own, so you will need to plan around that or perhaps use one of the planned ISV solutions.--Sent from my BlackBerry Wireless Handheld - Original Message - From: ActiveDir-owner Sent: 07/03/2003 10:00 AM To: [EMAIL PROTECTED] Subject: [ActiveDir] Identity Management using AD
All,

We are in the process of redefining our
Internet-enabled applications with a view to a centralised customer/client
database. There has been quite a bit of discussion regarding using AD as
this "customer store", since AD will already be in this
environment.

I'm a bit hesitant to recommend "vanilla" AD for
this task, however I can see a number of benefits to this approach, as the
support monkeys can manage the entire environment using the same tools they use
to manage the production environment (ADUC etc).

I've been reading up on the information regarding
MIIS (what little there is), and can see some potential for a configuration such
as this, eg:

- Use AD to store the "core" customer information
(user name, password, basic details)
- Use ADAM or SQL (or whatever) for each
application to store application specific extensions (so I don't end up with a
blown out schema in AD with thousands of additional props for user
objects)
- Use MIIS as the Authentication / Identity
management front end, and use it to sync these disparate databases to ensure
some semblance of "sameness" between them.
- Also use some of the MIIS features such as
provisioning etc to ease the management overhead.

Applications could use AD to authenticate the
customer coming in, and then use their ADAM database to house the application
specific information they need.

We could possibly then use MIIS to "backchannel"
into the production AD system, so that corporate users can gain access to these
Internet applications without requiring multiple accounts.

This is all just brainstorming at the moment,
however (as usual), I need to come up with some sort of design by next week
(gotta love being given lots of time *grin*). Having not actually got my
hands on MIIS, this could be completely unfeasible. Other options are a
custom database for the "customer store", or some other existing
product.

Has anyone been down this road before, and could
share some insights / resources ?

Thanks

Glenn





[ActiveDir] Identity Management using AD

2003-07-03 Thread Glenn Corbett



All,

We are in the process of redefining our 
Internet-enabled applications with a view to a centralised customer/client 
database. There has been quite a bit of discussion regarding using AD as 
this "customer store", since AD will already be in this 
environment.

I'm a bit hesitant to recommend "vanilla" AD for 
this task, however I can see a number of benefits to this approach, as the 
support monkeys can manage the entire environment using the same tools they use 
to manage the production environment (ADUC etc).

I've been reading up on the information regarding 
MIIS (what little there is), and can see some potential for a configuration such 
as this, eg:

- Use AD to store the "core" customer information 
(user name, password, basic details)
- Use ADAM or SQL (or whatever) for each 
application to store application specific extensions (so I don't end up with a 
blown out schema in AD with thousands of additional props for user 
objects)
- Use MIIS as the Authentication / Identity 
management front end, and use it to sync these disparate databases to ensure 
some semblance of "sameness" between them.
- Also use some of the MIIS features such as 
provisioning etc to ease the management overhead.

Applications could use AD to authenticate the 
customer coming in, and then use their ADAM database to house the application 
specific information they need.

We could possibly then use MIIS to "backchannel" 
into the production AD system, so that corporate users can gain access to these 
Internet applications without requiring multiple accounts.

This is all just brainstorming at the moment, 
however (as usual), I need to come up with some sort of design by next week 
(gotta love being given lots of time *grin*). Having not actually got my 
hands on MIIS, this could be completely unfeasible. Other options are a 
custom database for the "customer store", or some other existing 
product.

Has anyone been down this road before, and could 
share some insights / resources ?

Thanks

Glenn