churclillsquareconsulting-logo

Red Hat Security: Identity Management and Authentication (RH362)

Introduction:

This course will empower you with the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat® Enterprise Linux. You will master these skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance.

Objectives:

– Create and manage a scalable, resilient Identity Management realm, including both Linux and Microsoft Windows clients and servers.
– Create and manage secure access configurations, including managing and troubleshooting Kerberos, certificate servers, and access control policies.
– Integrate IdM as the back end for other major enterprise tools in the Red Hat portfolio, including Satellite Server and Tower.

Course Outline:

1 – INSTALL RED HAT IDENTITY MANAGEMENT

  • Describe and install Red Hat Identity Management (IdM).

2 – INTRODUCTION TO TROUBLESHOOTING

  • Describe a generalized strategy for troubleshooting.

3 – CENTRALIZE IDENTITY MANAGEMENT

  • Explain the IdM server services, explore IdM clients access methods, and install an IdM client.

4 – TAKE PROACTIVE STEPS TO PREVENT SMALL ISSUES

  • Prevent small issues from becoming large problems by employing proactive system administration techniques.

5 – AUTHENTICATE IDENTITIES WITH KERBEROS

  • Define the Kerberos protocol and configure services for Kerberos authentication.

6 – TROUBLESHOOT BOOT ISSUES

  • Identify and resolve issues that can affect a system’s ability to boot.

7 – IDENTIFY HARDWARE ISSUES

  • Identify hardware problems that can affect a system’s ability to operate.

8 – INTEGRATE IDM WITH ACTIVE DIRECTORY

  • Create a trust relationship with Active Directory.

9 – CONTROL USER ACCESS

  • Configure users for authorized access to services and resources.

10 – TROUBLESHOOT STORAGE ISSUES

  • Identify and fix issues related to storage.

11 – MANAGE A PUBLIC KEY INFRASTRUCTURE

  • Manage certificate authorities, certificates, and storing secrets.

12 – TROUBLESHOOT RPM ISSUES

  • Identify and fix problems in, and using, the package management subsystem.

13 – MAINTAIN IDM OPERATIONS

  • Troubleshoot and recover Identity Management.

14 – TROUBLESHOOT NETWORK ISSUES

  • Identify and resolve network connectivity issues.

15 – INTEGRATE RED HAT PRODUCTS WITH IDM

  • Configure major services to share the IdM authentication database.

16 – TROUBLESHOOT APPLICATION ISSUES

  • Debug application issues.

17 – DEAL WITH SECURITY ISSUES

  • Identify and fix issues related to security subsystems.

18 – INSTALL SCALABLE IDM

  • Construct a resilient and scalable Identity Management topology.

19 – TROUBLESHOOT KERNEL ISSUES

  • Identify kernel issues and assist Red Hat Support in resolving kernel issues.

20 – RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING COMPREHENSIVE REVIEW

  • Practice and demonstrate knowledge and skills learned in Red Hat Enterprise Linux Diagnostics and Troubleshooting.

Enroll in this course

4,966.77

Need Help Finding The Right Training Solution?

Our training advisors are here for you.

EUR Euro