Red Hat Security: Identity Management and Active Directory Integration Self-paced Training

Red Hat Security: Identity Management and Active Directory Integration Self-paced Training

Red Hat NIC-RH-RH362SP

USD 3,479.00
or 12.0 TU
excl. VAT

Provides help for secure, centralised identity management services to coordinate user authentication and authorisation with client systems, network services, and Windows domains. 
Red Hat Security: Identity Management and Authentication (RH362) teaches the skills to configure and manage Identity Management (IdM), the comprehensive identity management component bundled with Red Hat Enterprise Linux. This course will help students gain the skills most commonly requested by customers in using this technology.
Some of the topics covered in this course are centralised user account management and provisioning; designing and installing IdM server topologies; operating the integrated DNS and TLS Certification Authority services; managing two-factor authentication, smart card authentication, and operating as a single sign-on provider; integrating and managing bi-directional trusts with Active Directory; and troubleshooting and disaster recovery planning. Registration of Linux clients with IdM and operation in corporate environments using both Linux and Microsoft Windows clients and servers will be discussed.

Please note: It may take up to 48 hours until the access to this e-learning is provided.

Who should attend

  • Red Hat Certified System Engineers (RHCE) who want to learn how to deploy and configure centralised identity management solutions for Linux clients and how to integrate them with other network services and identity management systems.
  • Identity management specialists or engineers
  • Access management specialists or engineers

Course Prerequisites

  • Be certified as a Red Hat Certified System Administrator (RHCSA) (required)
    Be certified as a Red Hat Certified Engineer (RHCE) (recommended, but not required)

What you will learn

  • Design an identity management topology for scalability and resilience.
  • Describe the key technologies used by IdM, including SSSD, PAM, Kerberos and PKI.
  • Install Identity Management (IdM) servers, replicas and clients using Ansible playbooks.
  • Manage IdM services, including integrated DNS and CA.
  • Configure and manage Kerberos authentication and secure services.
  • Configure and manage TLS certificates.
  • Create and manage a trust relationship with Microsoft Active Directory.
  • Configure it for secure user authentication, including two-factor authentication and single sign-on.
  • Sudo, HBAC and RBAC configure and manage policies.
  • Manage secrets, vaults, certificates and keys.
  • Troubleshoot identity management issues.
  • Integrate Satellite 6 and Red Hat Ansible Automation Platform with IdM.
  • Configure IdM backup and restore.

What’s included

 Identity Management in Red Hat Enterprise Linux 
Introduction to identity management in Red Hat Enterprise Linux (IdM) and its high-level architecture.
 Identity management core technologies 
Review the core identity management (IdM) technologies in Red Hat Enterprise Linux.
 Installing Identity Management in Red Hat Enterprise Linux 
Install Identity Management servers, replicas, and clients on Red Hat Enterprise Linux 9.
 Implement an Identity Management topology 
Implement continuous and high functionality availability of IdM services in single site and geographically dispersed topologies.
 Management of integrated CA and DNS services 
Manage Certificate Authority (CA) and Domain Name System (DNS) services integrated with Identity Management.
 Manage users and control user access 
Configure users for authorised access to services and resources.
 Configure alternative authentication services 
Configure and manage smart card authentication, secrets and two-factor authentication.
 Integrate identity management with Active Directory 
Implement a forest-wide trust relationship between Identity Management and Active Directory and configure ID views to map POSIX attributes to Active Directory users.
Identity management integration with Red Hat Utilities 
Integrate an identity management deployment with Red Hat Satellite and Red Hat Ansible Automation Platform.
 Troubleshooting and disaster recovery planning for IdM 
Troubleshoot and prepare for disaster recovery with Identity Management.
 Comprehensive test report 
Create a small, resilient identity management topology that spans multiple replicas and clients, with multiple users, credentials, policies, and access rights.