01
Install Red Hat Identity Management
- Describe and install Red Hat Identity Management (IdM).
02
Centralize Identity Management
- Explain the IdM server services, explore IdM clients access methods, and install an IdM client.
03
Authenticate identities with Kerberos
- Define the Kerberos protocol and configure services for Kerberos authentication.
04
Integrate IdM with Active Directory
- Create a trust relationship with Active Directory.
05
Control user access
- Configure users for authorized access to services and resources.
06
Manage a public key infrastructure
- Manage certificate authorities, certificates, and storing secrets.
07
Maintain IdM operations
- Troubleshoot and recover Identity Management.
08
Integrate Red Hat products with IdM
- Configure major services to share the IdM authentication database.
09
Install scalable IdM
- Construct a resilient and scalable Identity Management topology.
Opinie
Na razie nie ma opinii o produkcie.