Detailed Course Outline
- Identity Management in Red Hat Enterprise Linux
- Introduce Identity Management in Red Hat Enterprise Linux (IdM) and its high-level architecture.
- Identity Management Core Technologies
- Review the core technologies of Identity Management (IdM) in Red Hat Enterprise Linux.
- Installing Identity Management in Red Hat Enterprise Linux
- Install Identity Management servers, replicas, and clients on Red Hat Enterprise Linux 9.
- Implementing an Identity Management Topology
- Implement continuous functionality and high availability of IdM services in single-site and geographically distributed topologies.
- Managing the CA and DNS Integrated Services
- Manage the Certificate Authority (CA) and the Domain Name System (DNS) services that are integrated with Identity Management.
- Managing Users and Controlling User Access
- Configure users for authorized access to services and resources.
- Configuring Alternative Authentication Services
- Configure and manage smart card authentication, secrets, and two-factor authentication.
- Integrating Identity Management with Active Directory
- Implement a cross-forest trust between Identity Management and Active Directory, and configure ID views to map POSIX attributes to Active Directory users.
- Integrating Identity Management with Red Hat Utilities
- Integrate an Identity Management deployment with Red Hat Satellite and Red Hat Ansible Automation Platform.
- Troubleshooting and Disaster Recovery Planning for IdM
- Troubleshooting and preparing for disaster recovery with Identity Management.
- Comprehensive Review
- Build a small, resilient Identity Management topology to include multiple replicas and clients, populated with multiple users, credentials, policies, and access rights.