Identity Management on Linux FreeIPA IdM
Identity Management on Linux using IdM on RHEL8
Note: 0/5 (0 notes) 775 students
Instructor(s): Akoley Aristide BEKROUNDJO
Last update: 2022-11-02
What you’ll learn
- Identity Management (IdM)
- IdM deployment on RHEL8
- IDM with external DNS
- USERS ACCESS CONTROL
- Basic IT and Cyber Security knowledge (Not essential)
- Experience with managing systems RHEL or CentOS
During this course, we’ll covers the installation, administration, and best practices for operating a FreeIPA or Red Hat IdM instance. The course includes coverage of FreeIPA users, groups, hosts, and access policies. Also included is coverage of the underlying technologies that form the basis of FreeIPA such as Kerberos, SSSD, and external DNS.
Also, how elegantly solve identity management across multiple platforms (Linux, Windows, UNIX, …)? IdM or FreeIPA offers a robust solution to manage all user accounts, groups, roles and permissions, including SSH keys and SUDO rules. Based on integration with Microsoft Active Directory, you can gain a unique linking the worlds of Microsoft and UNIX / Linux.
This course is intended for IT administrators of Linux systems who want to learn how IdM works and learn how to install or operate. The participants go through various scenarios, including deployment IdM architecture design in multiple locations, integration with Microsoft AD domain, the migration of users from other systems and backup.
FreeIPA → Identity Management for Linux Domain Environments & Trust is a dedicated training which helps you understand the basics and deploy later very expanded Linux Domain Environments within your private or cloud infrastructure.
During hands-on labs we will cover in details every important aspect and functionality of IdM (FreeIPA). Except simple things like user or password management we will talk about installations and advanced integrations with Active Directory. We will deep dive into replication process and issues, 2FA setups. Distributed SUDO and Host-Based Access Control rules for your desktops, servers and critical applications allow you to build controlled, secured and accountable environment and this training shows you all of that.
Who this course is for
- IT and Cyber Security Students
- Information Security Team members
- Information Security Professional
- IT professionals
- DNS INSTALL ON CENTOS8
- IDM SERVER INSTALL ON RHEL8
- UPDATE EXTERNAL DNS
- IDM CLIENT INSTALL ON REDHAT8
- USER ACCES WITH PASSWORD
|Don’t miss any coupons by joining our Telegram group|