Abstract
| Goal |
Build a small, resilient Identity Management topology to include multiple replicas and clients, populated with multiple users, credentials, policies, and access rights. |
| Objectives |
|
| Sections |
|
| Lab |
|
After completing this section, you should have reviewed and refreshed the knowledge and skills that you learned in Red Hat Security: Identity Management and Authentication.
Before beginning the comprehensive review for this course, you should be comfortable with the topics covered in each chapter. Do not hesitate to ask the instructor for extra guidance or clarification on these topics.
Chapter 1, Identity Management in Red Hat Enterprise Linux
Introduce Identity Management in Red Hat Enterprise Linux (IdM) and its high-level architecture.
Describe the IdM components, ecosystem, topology, and management interfaces.
Chapter 2, Identity Management Core Technologies
Review the core technologies of Identity Management (IdM) in Red Hat Enterprise Linux.
Describe the IdM core technologies.
Chapter 3, Installing Identity Management in Red Hat Enterprise Linux
Install Identity Management servers, replicas, and clients on Red Hat Enterprise Linux 9.
Choose an installation method and the components to integrate, configure the system prerequisites, and install the first IdM server in an Identity Management plan.
Choose an installation method, configure the system prerequisites, and install an IdM client.
Choose an installation method, configure the system prerequisites, and install an IdM replica server.
Prepare for installing servers, clients, and replicas in an IdM topology plan by using Ansible Playbooks.
Chapter 4, Implementing an Identity Management Topology
Implement continuous functionality and high availability of IdM services in single-site and geographically distributed topologies.
Create an IdM topology by establishing replication agreements, manage the replication topology with Ansible, and promote and demote hidden replicas.
Manage the topology's server roles to implement continuous functionality and high availability for the essential IdM services.
Chapter 5, Managing the CA and DNS Integrated Services
Manage the Certificate Authority (CA) and the Domain Name Service (DNS) that are integrated with Identity Management.
Issue certificates, configure certificate-based authentication, and control certificate validity.
Manage the integrated DNS service configuration, zones, and locations.
Chapter 6, Managing Users and Configuring User Access
Configure users for authorized access to services and resources.
Manage user, group and host accounts, and implement user life cycles by staging, activating, and preserving user accounts.
Grant and restrict IdM user access by implementing role-based, host-based, and Sudo access control rules.
Manage Kerberos principal keytab files, implement Kerberos ticket policies to set restrictions on ticket access, duration, and renewal, and configure external systems to enable IdM user access using Kerberos credentials.
Configure NFS shares, including home directories, to mount automatically for IdM users logged in to IdM clients.
Chapter 7, Configuring Alternative Authentication Services
Configure and manage smart card authentication, secrets, and single sign-on.
Manage smart card authentication in Red Hat Enterprise Linux.
Store, retrieve, and share secrets for users and services.
Configure the two-factor authentication capabilities implemented in IdM.
Chapter 8, Integrating Identity Management with Active Directory
Implement a cross-forest trust between Identity Management and Active Directory, and configure ID views to map POSIX attributes to Active Directory users.
Configure a cross-forest trust between an IdM domain and an Active Directory domain.
Redefine POSIX attribute values associated with IdM or Active Directory users on IdM clients.
Chapter 9, Integrating Identity Management with Red Hat Utilities
Integrate an Identity Management deployment with Red Hat's single sign-on technology, Red Hat Satellite, and Red Hat Ansible Automation Platform.
Configure Red Hat's single sign-on technology to get information from the IdM service and use it for authentication.
Integrate Red Hat Satellite with an Identity Management server and enable host-based access control.
Configure IdM as a source for account authentication information for automation controller users.
Chapter 10, Troubleshooting and Disaster Recovery Planning for IdM
Troubleshooting and preparing for disaster recovery with Identity Management.
Recovering from a disaster affecting an Identity Management deployment.
Monitor, analyze, and troubleshoot the individual components of IdM.