If you were talking to someone whose organization is considering Microsoft Identity Manager, what would you say?
How would you rate it and why? Any other tips or advice?
I would say that it's the best solution on the market and I would go ahead with it. I would rate this solution a nine out of ten.
Over the years Microsoft has improved a lot. We don't have problems like we used to have in previous versions. There's still more room for improvement, however. They have begun listening to their customers, and they are bringing out features that customers are asking for and if I can get that from an OEM it gives me the assurance that everyone is being taken care of. I would recommend the solution, however if a person is considering implementing it, they need to have a plan. Otherwise, they might start off and only after realize that there are options that weren't implemented well. It's good to always have a plan of what you want to implement something new. Review it and let your team query it, so you know exactly what you are deploying. I would rate the solution eight out of ten.
My advice to someone implementing this solution would be to implement the on-premise identity and access management solution if they've got more than 1,000 identities on-premise. I strongly recommend implementing an on-premise environment in that case, or if they are a financial institution, such as a bank or underwriting institution. They also should implement the hybrid deployment, which means there would be an integration of the identity management solution sitting on-premises and a combination of the Azure Active Directory as an identity and access management in the cloud-based environment. For small businesses, I would recommend that they implement the cloud-based identity and access management solution, leveraging the provided Azure Active Directory by Microsoft. I'd give Microsoft Identity Manager a rating of nine out of ten. I'm giving it a nine because I'm looking at the hybrid scenario and more strongly on the cloud-based identity and access management solution for Microsoft. It has a lot of features; it has all the bells and whistles of identity and access management, such as adaptive MFA, intelligent graph security API, and being powered by Microsoft Graph API. Also, the multi-factor authentication is easy to set up, with a single button. For Windows environments, you just install one application API, called AD Connect, to sync all the on-premises identity to the Microsoft Azure Active Directory. The reason why I'm not giving it a ten is that they still need to upgrade their solution to enable a new feature to accommodate Linux and Unix identity directory specifically to integrate with Microsoft Azure Active Directory. It seems as if the company does not want to provide that capability because now they are focusing on growing their own Microsoft Azure cloud, which means they are forcing all those customers that are running the Linux or Unix environment to come and migrate or lift and shift all their Linux or Unix workloads into Microsoft Azure. I think they are focusing on growing their own environment, which is why they are not providing this capability.
I strongly recommend this solution. It encompasses the cloud, on-premises applications, mobility, and on-premises users. The modern enterprise encrypted license is one of the best solutions to go for because of the mobility and security for the workforce, as well as for the company. I would rate this solution an eight out of ten.
I would recommend this product to a colleague at another company. I would rate this solution a nine out of ten.
The out of the box connectors need to be increased. We can integrate with multiple applications to connect together through using Microsoft Identity Manager. I would grade Microsoft Identity Manager at 7 or 8 out of 10. I wouldn't give it a ten because of the lack of out of box connectors. I don't see any other drawback in the product.