ThirdSpace ThirdSpace
ThirdSpace
Close 0 Reset Search Run Search What are you looking for? Type at least three characters to search. Filter Search Results
  • All Content
  • Blog
  • Case Studies
  • Event
  • Resources
  • News
  • Careers
  • Access Centre
  • Technologies
  • Workshops
  • Solutions
  • People
Load more
30 November 2015

Top 3 reasons to upgrade from FIM to Microsoft Identity Manager (MIM)

Simon Veale

Microsoft withdrew mainstream support for Forefront Identity Manager on 10 October 2017.

What better reason do you need to upgrade from FIM to MIM? Without technical support and security updates, organisations using the popular identity management platform will be taking unnecessary risks.

But there are 3 big reasons why that move should have already happened.

 

FIM Vs. MIM: A clear winner

Since its launch in 2010, Forefront Identity Manager (FIM) has become synonymous with identity life cycle management. Microsoft’s powerful platform has helped many businesses save a lot of time and money by automating key IAM tasks. However, the way businesses operate has changed significantly over the last few years, and with that has come increased risk and fresh challenges.

Whilst you could argue that Microsoft Identity Manager (MIM) is just FIM with an additional interface and a better connection to the Microsoft Cloud; it’s those additions which could be crucial to the success of your business over the next five years.

The good news is that MIM has been around for some time. Since it hit general availability status in June 2015, it has been tried and tested, with 3 factors cited for its success:

1. Privileged Access Management (PAM)

PAM is MIM’s key security feature – and it’s timely. With Wonga, Tesco and Yahoo! amongst a number of high profile data breaches in 2016/17, organisations are starting to think ‘when’ rather than ‘if’ they are going to be compromised by a serious cyber or insider attack.

With PAM, organisations get essential visibility of when users are undertaking administrative tasks within their network. It uses a Bastion directory to provide timely and managed elevation of access for the on-premises directory service. This is achieved by creating a set of administration roles that can be requested and authorised before a user gains the relevant privilege. All of these elements are accessed using a web interface.

PAM will help organisations protect themselves against a number of attack methods used by hackers to gain administration access to their servers.

See the Microsoft identity stack in action

View 'Microsoft identity stack demos: Overcoming typical challenges when setting up new user' and learn about:

  • Easily creating new user accounts for internal employees and external contractors
  • Reducing risk through automation and password self-service capabilities
Watch now

2. Hybrid reporting and synchronisation

Although you were able to provision accounts into a variety of cloud systems using FIM, and this has not changed, the improved integration with Azure Active Directory (AD) Premium in MIM is significant.

MIM links directly to the Azure environment to enable multi-factor authentication (MFA) when users want to reset their own password (via a mobile phone).

You can also report on events that take place within the MIM environment, so they can be included in the Azure AD Premium security reports. Since Azure AD Premium also includes licensing for MIM, this ensures that the identity management on-premises events can be linked to the cloud-based environment.

3. Modernisation

The user portal has hardly changed and still works in the same way – so the interface is familiar and easy to use, which should help keep your employees happy and more productive.

However, there have been a number of changes in the background. Crucially, this means MIM will support the latest platforms, including Windows Server 2012 R2 (which is the server platform ThirdSpace recommends).

Modern APIs will support the certificate management system and the PAM system. The new certificate management APIs are particularly noteworthy, as they allow users and managers to request and renew PKI certificates when utilising RESTful API calls.

 

Final thoughts

The best word to describe Microsoft Identity Manager is continuity. Importantly, MIM retains the core components which its users are familiar with, but the software has been brought up to date. New features may have been kept to a minimum, but they have been carefully considered to ensure businesses can achieve the platform’s full potential and remain secure.

Next, watch the Microsoft identity stack demos to see how Microsoft’s key identity management technologies (including MIM) enable seamless user creation journeys.

Or download the identity trends e-Guide to learn what’s driving demand for modern IAM.

You may also like...

Blog

ADFS vs. Azure AD: How Microsoft has changed the authentication game

Blog

Azure AD Connect v1.3: Group writeback, new support agents, connector warnings and more

Blog

MIM to the maximum: Advanced identity reporting and user controls

Recent Blog Articles

View All
Author
Simon Veale
Senior Architect
Learn More

Apply for a free Identity Management Workshop

Envision a secure future, with automated user management and controlled access.

Apply for free workshop
Award-winning solutions Award-winning solutions

Eight-time winner of the Microsoft Partner of the Year Award for Identity Management, Enterprise Mobility, and Security and Compliance.

ThirdSpace Please upgrade your browser

You are seeing this because you are using a browser that is not supported. The ThirdSpace website is built using modern technology and standards. We recommend upgrading your browser with one of the following to properly view our website:

Windows Mac

Please note that this is not an exhaustive list of browsers. We also do not intend to recommend a particular manufacturer's browser over another's; only to suggest upgrading to a browser version that is compliant with current standards to give you the best and most secure browsing experience.