Identity Management on Linux FreeIPA IdM

Identity Management on Linux using IdM on RHEL8

Ratings 3.95 / 5.00
Identity Management on Linux FreeIPA IdM

What You Will Learn!

  • Identity Management (IdM)
  • IdM deployment on RHEL8
  • IDM with external DNS
  • USERS ACCESS CONTROL

Description

During this course, we’ll covers the installation, administration, and best practices for operating a FreeIPA or Red Hat IdM instance. The course includes coverage of FreeIPA users, groups, hosts, and access policies. Also included is coverage of the underlying technologies that form the basis of FreeIPA such as Kerberos, SSSD, and external DNS.

Also, how elegantly solve identity management across multiple platforms (Linux, Windows, UNIX, ...)? IdM or FreeIPA offers a robust solution to manage all user accounts, groups, roles and permissions, including SSH keys and SUDO rules. Based on integration with Microsoft Active Directory, you can gain a unique linking the worlds of Microsoft and UNIX / Linux.

This course is intended for IT administrators of Linux systems who want to learn how IdM works and learn how to install or operate. The participants go through various scenarios, including deployment IdM architecture design in multiple locations, integration with Microsoft AD domain, the migration of users from other systems and backup.


FreeIPA → Identity Management for Linux Domain Environments & Trust is a dedicated training which helps you understand the basics and deploy later very expanded Linux Domain Environments within your private or cloud infrastructure.

During hands-on labs we will cover in details every important aspect and functionality of IdM (FreeIPA). Except simple things like user or password management we will talk about installations and advanced integrations with Active Directory. We will deep dive into replication process and issues, 2FA setups. Distributed SUDO and Host-Based Access Control rules for your desktops, servers and critical applications allow you to build controlled, secured and accountable environment and this training shows you all of that.

Who Should Attend!

  • IT and Cyber Security Students
  • Information Security Team members
  • Information Security Professional
  • IT professionals

TAKE THIS COURSE

Tags

  • Identity and Access Management

Subscribers

2024

Lectures

5

TAKE THIS COURSE



Related Courses