Abstract
| Goal |
Review tasks from Red Hat Single Sign-On Administration |
| Objectives |
|
| Sections |
|
| Lab |
|
After completing this section, you should have reviewed and refreshed the knowledge and skills that you learned in Red Hat Single Sign-On Administration.
Before beginning the comprehensive review for this course, you should be comfortable with the topics covered in each chapter. Do not hesitate to ask the instructor for extra guidance or clarification on these topics.
Introduce Red Hat Single Sign-On
Identify the main components of Red Hat Single Sign-On.
Describe single sign-on systems and the need for them.
Describe the architecture and features of Red Hat Single Sign-On.
Install and Configure Red Hat Single Sign-On
Identify the best option for installing and configuring RH-SSO depending on the infrastructure.
Install and Configure Red Hat Single Sign-On.
Authentication and Authorization
Configure authentication and authorization for applications.
Configure authentication and authorization for applications.
Identity Brokering and User Federation
Configure RH-SSO to secure applications from multiple identity providers, by using user federation and social logins.
Configure RH-SSO to secure applications from multiple identity providers, by using user federation and social logins.
Red Hat Single Sign-On on Red Hat OpenShift
Install and configure Red Hat Single Sign-On on Red Hat OpenShift.
Install and configure Red Hat Single Sign-On on Red Hat OpenShift.