Course Objectives
As a result of attending this course, you will gain an understanding of the architecture of an identity management realm and trusted relationships using both Red Hat Enterprise Linux Identity Management and Microsoft Active Directory. You will be able to create, manage, and troubleshoot user management structures, security policies, local and remote secure access methods, and implementation technologies such as Kerberos, PKI, and certificates. You should be able to demonstrate these skills:
- Create and manage a scalable, resilient Identity Management realm, including both Linux and Microsoft Windows clients and servers. Create and manage secure access configurations, including managing and troubleshooting Kerberos, certificate servers, and access control policies. Integrate IdM as the back end for other major enterprise tools in the Red Hat portfolio, including Satellite Server and Tower.
Agenda
- Describe and install Red Hat Identity Management (IdM).
- Explain the IdM server services, explore IdM clients access methods, and install an IdM client.
- Define the Kerberos protocol and configure services for Kerberos authentication.
- Create a trust relationship with Active Directory.
- Configure users for authorized access to services and resources.
- Manage certificate authorities, certificates, and storing secrets.
- Troubleshoot and recover Identity Management.
- Configure major services to share the IdM authentication database.
- Construct a resilient and scalable Identity Management topology.
FREE
Interested in course?
Course Type: Instructor Led