red-hat-training-courses
8169  Reviews star_rate star_rate star_rate star_rate star_half

Red Hat Security: Identity Management and Active Directory Integration

Red Hat Security: Identity Management and Active Directory Integration (RH362) provides the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat®...

Read More
$4,280 USD GSA  $3,665.49
Course Code RH362
Duration 5 days
Available Formats Virtual, Classroom

Red Hat Security: Identity Management and Active Directory Integration (RH362) provides the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat® Enterprise Linux. This course is based on Red Hat Identity Manager 4.5 (bundled with RHEL), Red Hat Enterprise Linux 7.4, Microsoft Windows Server 2016, Red Hat Satellite 6.3, Red Hat Ansible Tower 3.2.2, and Red Hat Ansible 2.5.

Skills Gained

  • Install Red Hat Identity Management servers, replicas, and clients.
  • Configure and manage Kerberos authentication and secure services.
  • Create and manage a trust relationship with Microsoft Active Directory.
  • Configure highly secure user authentication—local and remote—including two-factor authentication
  • Manage secrets, vaults, certificates, and keys.
  • Troubleshoot identity management processes.
  • Integrate Satellite 6 with IdM.
  • Integrate Tower with IdM.
  • Configure IdM backup and recovery./li>

Who Can Benefit

  • Red Hat Certified System Administrator (RHCSA) who wants to learn how to provision and configure IdM technologies across both Linux and Windows applications
  • Identity management specialist or engineer
  • Access management specialist or engineer
  • Web application developer
  • DevOps specialist

Prerequisites

  • Be certified as a Red Hat Certified System Administrator (RHCSA) (required)
  • Be certified as a Red Hat Certified Engineer (RHCE) (recommended, but not required)

Course Details

Outline for this course

  • Install Red Hat Identity Management
  • Centralize Identity Management
  • Authenticate identities with Kerberos
  • Integrate IdM with Active Directory
  • Control user access
  • Manage a public key infrastructure
  • Maintain IdM operations
  • Integrate Red Hat products with IdM
  • Install scalable IdM
|
View Full Schedule