Red Hat Security: Identity Management and Active Directory Integration (RH362) – Outline

Detailed Course Outline

  • Identity Management in Red Hat Enterprise Linux
  • Introduce Identity Management in Red Hat Enterprise Linux (IdM) and its high-level architecture.
  • Identity Management Core Technologies
  • Review the core technologies of Identity Management (IdM) in Red Hat Enterprise Linux.
  • Installing Identity Management in Red Hat Enterprise Linux
  • Install Identity Management servers, replicas, and clients on Red Hat Enterprise Linux 9.
  • Implementing an Identity Management Topology
  • Implement continuous functionality and high availability of IdM services in single-site and geographically distributed topologies.
  • Managing the CA and DNS Integrated Services
  • Manage the Certificate Authority (CA) and the Domain Name System (DNS) services that are integrated with Identity Management.
  • Managing Users and Controlling User Access
  • Configure users for authorized access to services and resources.
  • Configuring Alternative Authentication Services
  • Configure and manage smart card authentication, secrets, and two-factor authentication.
  • Integrating Identity Management with Active Directory
  • Implement a cross-forest trust between Identity Management and Active Directory, and configure ID views to map POSIX attributes to Active Directory users.
  • Integrating Identity Management with Red Hat Utilities
  • Integrate an Identity Management deployment with Red Hat Satellite and Red Hat Ansible Automation Platform.
  • Troubleshooting and Disaster Recovery Planning for IdM
  • Troubleshooting and preparing for disaster recovery with Identity Management.
  • Comprehensive Review
  • Build a small, resilient Identity Management topology to include multiple replicas and clients, populated with multiple users, credentials, policies, and access rights.