Summary
After working through this chapter, you should be able to configure and handle an identity and access management solution with multiple forests. You should also be able to provide this functionality across company borders for secure application and information access. We used the approach to provide you the idea for several scenarios, which we always get asked about in our customer discussions, to provide a suitable hybrid structure. It's impossible to bring all the configuration steps into the book, because the page count would explode, so we used qualified references to help you configure such scenarios. Otherwise, we have configured many on premise services. We see it in the field to really provide a hybrid strategy and a lot of services are still on premise; because of this reason, we choose to integrate these configurations.
In the following chapter, we will focus on more extended scenarios and on access management features.