Duration: 4 Days
This course offers theoretical and hands-on instruction in the administrative functions, operations, installation, and configuration tasks associated with the RSA Access Manager product. You will cover RSA Access Manager system architecture, server structure, integration of components into an enterprise infrastructure, user organization, and the importance of various configuration parameters. Hands-on labs allow you to work step-by-step through the phases of RSA Access Manager implementation and reinforce the tasks involved in creating a complete web access management solution.
What You Will Learn
- Basic architecture and integration of RSA Access Manager in an enterprise
environment
- Processes and methodology for performing a successful
installation and implementation of the core servers, data adapter,
administrative console, and representative Agents
- Management functions used
for resource and end user administration
- Perform typical administration
functions to populate and configure users, administrators, and groups in an RSA
Access Manager database
- Configuration parameters used to tailor the RSA
Access Manager components to accomplish specific tasks and functions
- Establish entitlements and use RSA Access Manager Smart Rules to manage web
access and protect resources in a classroom web environment
- Perform system
troubleshooting and analysis through the use of audit logs and user reports
- Explore how runtime and administrative operations can be extended through the
use of the API library
Audience
System, security, and help desk personnel who need to install, deploy, and/or maintain RSA Access Manager
Prerequistes
- Familiarity with web
and directory server or database technologies
- Functional knowledge
of OS and networking fundamentals
Course Outline
1. RSA Access Manager
- RSA Access Manager and its Contribution to Access Management
2. RSA Access
Manager Architecture
- Functions of the Primary Servers, and Web and Application Server Agents
- Data Flow for the Runtime and Administrative Operations
- Fitting RSA Access Manager into a Distributed Security Model
3. Installation
and Configuration
- RSA
Access Manager System Requirements and Pre-Installation Readiness Tasks
- Installation Procedure, Options, and Recommended Practices
- Installation of Access Manager Servers, LDAP Data Adapter, Administrative
Console, and Web and Application Server Agents
- Configuration of Web Server for Single Sign-On
4. Managing Resources
- Protecting Resources (Web Sites, Applications, etc.) Using RSA Access Manager
- Selectivity and Granularity in Various Situations
- Registration of Web Servers
- Applications
- Virtual Web
Server Hosts
- Configuring of
Web Server for Virtual Hosts
5. Delegated Administration
- Administrative Structure that is Possible in an RSA Access Manager Installation
- Using Administrative Groups
and Ownership Hierarchy of Administrators, Users, and Objects
- Administrative Roles and Responsibilities
6. Managing the Organization
- Policy Control for User Authentication and Passwords
- Methodology of Structuring Users, Groups, User Attributes, and Properties
- Creating of User Properties and Addition of Users to Groups
7. Resource
Protection and Authentication
- Using Authentication Methods to Protect Resources
- Form-Based vs. Challenge/Response Authentication
- Chaining and Combining Forms
- Defining Resources to Allow Granular Protection
- Using RSA Access Manager Entitlements and Smart Rules to Selectively Manage
Access to Resources
- Managing Conflicts Among Smart Rules and Between Smart Rules and Entitlements
- Configuring Access Manager for
External Authentication and URL Retention
8. Troubleshooting
- Log Files and Using special configuration parameters to Control Log Detail
- Configuring of Servers for Centralized Logging
- Configuring of Network Management
- Approaches to User and System Troubleshooting
9. Development Tools
- Various Runtime, Administrative, and Web Agent Extension API Tools that
are Available
- Examination and
implementation of JAVA coding examples
10. Single Sign-On
- Function and Objectives of Creating a Single Sign-On Environment
- Differences and Challenges of 'Intra-' vs. 'Inter-' Site Single Sign-On
- Configuring of Access Manager for SSO and ISSO
11. Distributed Authorization
- Achieving Redundant
Functionality and Failover
- Differences in Standard Mode vs. Distributed Mode Failover
- Testing Centralized
Logging
Course Labs
In addition to lecture and demonstrations, this course includes hands-on exercises which are designed to give you practical experience.