RSA Access Manager Administration, Installation and Configuration

Contact PI


  • classroom

  • virtual

  • Onsite
Duration: 4 Days

This course offers theoretical and hands-on instruction in the administrative functions, operations, installation, and configuration tasks associated with the RSA Access Manager product. You will cover RSA Access Manager system architecture, server structure, integration of components into an enterprise infrastructure, user organization, and the importance of various configuration parameters. Hands-on labs allow you to work step-by-step through the phases of RSA Access Manager implementation and reinforce the tasks involved in creating a complete web access management solution.

What You Will Learn

  • Basic architecture and integration of RSA Access Manager in an enterprise environment
  • Processes and methodology for performing a successful installation and implementation of the core servers, data adapter, administrative console, and representative Agents
  • Management functions used for resource and end user administration
  • Perform typical administration functions to populate and configure users, administrators, and groups in an RSA Access Manager database
  • Configuration parameters used to tailor the RSA Access Manager components to accomplish specific tasks and functions
  • Establish entitlements and use RSA Access Manager Smart Rules to manage web access and protect resources in a classroom web environment
  • Perform system troubleshooting and analysis through the use of audit logs and user reports
  • Explore how runtime and administrative operations can be extended through the use of the API library

Audience

System, security, and help desk personnel who need to install, deploy, and/or maintain RSA Access Manager

Prerequistes

  • Familiarity with web and directory server or database technologies
  • Functional knowledge of OS and networking fundamentals

Course Outline

1. RSA Access Manager

  • RSA Access Manager and its Contribution to Access Management

2. RSA Access Manager Architecture

  • Functions of the Primary Servers, and Web and Application Server Agents
  • Data Flow for the Runtime and Administrative Operations
  • Fitting RSA Access Manager into a Distributed Security Model

3. Installation and Configuration

  • RSA Access Manager System Requirements and Pre-Installation Readiness Tasks
  • Installation Procedure, Options, and Recommended Practices
  • Installation of Access Manager Servers, LDAP Data Adapter, Administrative Console, and Web and Application Server Agents
  • Configuration of Web Server for Single Sign-On

4. Managing Resources

  • Protecting Resources (Web Sites, Applications, etc.) Using RSA Access Manager
    • Selectivity and Granularity in Various Situations
  • Registration of Web Servers
  • Applications
  • Virtual Web Server Hosts
  • Configuring of Web Server for Virtual Hosts

5. Delegated Administration

  • Administrative Structure that is Possible in an RSA Access Manager Installation
  • Using Administrative Groups and Ownership Hierarchy of Administrators, Users, and Objects
  • Administrative Roles and Responsibilities

6. Managing the Organization

  • Policy Control for User Authentication and Passwords
  • Methodology of Structuring Users, Groups, User Attributes, and Properties
  • Creating of User Properties and Addition of Users to Groups

7. Resource Protection and Authentication

  • Using Authentication Methods to Protect Resources
    • Form-Based vs. Challenge/Response Authentication
    • Chaining and Combining Forms
  • Defining Resources to Allow Granular Protection
  • Using RSA Access Manager Entitlements and Smart Rules to Selectively Manage Access to Resources
  • Managing Conflicts Among Smart Rules and Between Smart Rules and Entitlements
  • Configuring Access Manager for External Authentication and URL Retention

8. Troubleshooting

  • Log Files and Using special configuration parameters to Control Log Detail
  • Configuring of Servers for Centralized Logging
  • Configuring of Network Management
  • Approaches to User and System Troubleshooting

9. Development Tools

  • Various Runtime, Administrative, and Web Agent Extension API Tools that are Available
  • Examination and implementation of JAVA coding examples

10. Single Sign-On

  • Function and Objectives of Creating a Single Sign-On Environment
  • Differences and Challenges of 'Intra-' vs. 'Inter-' Site Single Sign-On
  • Configuring of Access Manager for SSO and ISSO

11. Distributed Authorization

  • Achieving Redundant Functionality and Failover
  • Differences in Standard Mode vs. Distributed Mode Failover
  • Testing Centralized Logging

Course Labs

In addition to lecture and demonstrations, this course includes hands-on exercises which are designed to give you practical experience.