Course

Red Hat Security: Identity Management and Authentication («RH362»)

Red Hat Security: Identity Management and Authentication (RH362) provides the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat® Enterprise Linux.
Duration 4 days
Price 3'700.–
Please note:  This is a reseller course and as such excluded from any discounts.

Course facts

  • Installing Red Hat Identity Management servers, replicas, and clients
  • Configuring and managing Kerberos authentication and secure services
  • Creating and managing a trust relationship with Microsoft Active Directory
  • Configuring highly secure user authentication—local and remote—including two-factor authentication
  • Managing secrets, vaults, certificates, and keys
  • Troubleshooting identity management processes
  • Integrating Satellite 6 with IdM
  • Integrating Tower with IdM
  • Configuring IdM backup and recovery
This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance.
  • Install Red Hat Identity Management
    • Describe and install Red Hat Identity Management (IdM).
  • Centralize Identity Management
    • Explain the IdM server services, explore IdM clients access methods, and install an IdM client.
  • Authenticate identities with Kerberos
    • Define the Kerberos protocol and configure services for Kerberos authentication.
  • Integrate IdM with Active Directory
    • Create a trust relationship with Active Directory.
  • Control user access
    • Configure users for authorized access to services and resources.
  • Manage a public key infrastructure
    • Manage certificate authorities, certificates, and storing secrets.
  • Maintain IdM operations
    • Troubleshoot and recover Identity Management.
  • Integrate Red Hat products with IdM
    • Configure major services to share the IdM authentication database.
  • Install scalable IdM
    • Construct a resilient and scalable Identity Management topology.
Note: Course outline is subject to change with technology advances and as the nature of the underlying job evolves.
  • Red Hat Certified System Administrators (RHCSA) who wants to learn how to provision and configure IdM technologies across both Linux and Windows applications
  • Identity management specialists or engineers
  • Access management specialists or engineers
  • Web application developers
  • DevOps specialists

Download

Questions