Red Hat Security: Identity Management and Authentication (RH362)

Enable secure and centralized identity management for seamless user authentication and authorization across systems, networks, and Windows domains.

Fill the form to get up to 20% discount!

Course description

Enable secure and centralized identity management for seamless user authentication and authorization across systems, networks, and Windows domains.

Red Hat Security: Identity Management and Authentication (RH362) equips you with the skills to configure and oversee Identity Management (IdM), a comprehensive identity management component within Red Hat Enterprise Linux. This course focuses on central user account management, IdM server topology design and installation, integrated DNS and TLS Certificate Authority services, two-factor and smart card authentication, single sign-on provision, two-way trust integration with Active Directory, and troubleshooting. Upon completion, you gain a 45-day extended access to hands-on labs, enhancing your practical experience in enterprise environments with Linux and Microsoft Windows clients and servers.

Course content summary

    1. Design Scalable and Resilient IdM Topology:
      • Develop an Identity Management topology that ensures scalability and resilience.
    2. Key IdM Technologies:
      • Understand crucial IdM technologies, including SSSD, PAM, Kerberos, and PKI.
    3. Automated Deployment with Ansible:
      • Utilize Ansible Playbooks for the seamless installation of Identity Management servers, replicas, and clients.
    4. Service Management:
      • Effectively manage IdM services, integrating DNS and Certificate Authority (CA) components.
    5. Authentication and Security:
      • Configure and manage Kerberos authentication, ensuring secure services.
      • Manage TLS certificates to enhance security.
    6. Integration with Active Directory:
      • Establish and manage trust relationships with Microsoft Active Directory.
    7. Enhanced Authentication Measures:
      • Implement security measures for user authentication, including two-factor authentication and single sign-on.
    8. Policy Configuration:
      • Configure and manage policies such as Sudo, HBAC (Host-Based Access Control), and RBAC (Role-Based Access Control).
    9. Secrets and Key Management:
      • Effectively manage secrets, vaults, certificates, and keys.
    10. Troubleshooting:
      • Develop troubleshooting skills for identity management systems.
    11. Integration with Satellite 6 and Ansible Automation Platform:
      • Seamlessly integrate Identity Management with Satellite 6 and Red Hat Ansible Automation Platform.
    12. Backup and Recovery:
      • Implement and configure backup and recovery procedures for Identity Management.

Audience for this course

This course is ideal for Red Hat Certified System Engineers (RHCE) aiming to acquire expertise in provisioning and configuring centralized identity management solutions for Linux clients and integrating them with network services. It is also well-suited for Identity Management specialists and engineers, along with Access Management specialists and engineers, seeking to enhance their skills in the field.

Prerequisites for this course

Recommended training

Technology considerations

No special requirements are necessary beyond the standard prerequisites for courses delivered in ILT (Instructor-Led Training), VT (Virtual Training), ROLE (Red Hat Online Learning), or RHLS (Red Hat Learning Subscription) delivery modes.

Identity Management in Red Hat Enterprise Linux - Course Outline

Identity Management in Red Hat Enterprise Linux – Course Outline:

  1. Introduction to IdM:

    • Explore Identity Management in Red Hat Enterprise Linux (IdM) and understand its high-level architecture.
  2. Core IdM Technologies:

    • Review the foundational technologies integral to Identity Management (IdM) in Red Hat Enterprise Linux.
  3. Installation Process:

    • Learn how to install Identity Management servers, replicas, and clients on Red Hat Enterprise Linux 9.
  4. Implementing Identity Management Topology:

    • Gain insights into implementing continuous functionality and achieving high availability of IdM services in both single-site and geographically distributed topologies.
  5. Managing CA and DNS Services:

    • Acquire skills to manage the Certificate Authority (CA) and Domain Name System (DNS) services integrated with Identity Management.
  6. User Management and Access Control:

    • Configure users for authorized access to services and resources.
  7. Alternative Authentication Services:

    • Configure and manage smart card authentication, secrets, and two-factor authentication.
  8. Integration with Active Directory:

    • Implement a cross-forest trust between Identity Management and Active Directory, and configure ID views for mapping POSIX attributes to Active Directory users.
  9. Integration with Red Hat Utilities:

    • Integrate Identity Management with Red Hat Satellite and Red Hat Ansible Automation Platform.
  10. Troubleshooting and Disaster Recovery:

    • Develop troubleshooting skills and disaster recovery plans for Identity Management.
  11. Comprehensive Review:

    • Build a small, resilient Identity Management topology with multiple replicas and clients, populated with diverse users, credentials, policies, and access rights.

Organizational Impact: Achieving Excellence in Identity Management

This course empowers businesses to seamlessly integrate and centralize lifecycle management alongside the implementation and enforcement of robust security policies. Furthermore, organizations can extend this consolidated management approach to include additional enterprise configuration management products within the Red Hat portfolio, such as Red Hat Ansible Automation Platform and Red Hat Satellite Server. This holistic approach enhances operational efficiency and ensures a cohesive and secure IT environment across the enterprise.

While Red Hat has meticulously designed this course for customer benefit, the uniqueness of each company and infrastructure implies that actual results and benefits may vary.

Impact on the individual

Upon completion of this course, participants will acquire a comprehensive understanding of the architecture of an identity management realm and trusted relationships. This knowledge spans the utilization of both Identity Management in Red Hat Enterprise Linux and Microsoft Active Directory. Participants will develop the skills to create, manage, and troubleshoot user management structures, implement security policies, configure local and remote secure access methods, and leverage technologies including SSSD, Kerberos, PKI, and certificates. This proficiency will empower individuals to enhance identity management practices within their organizations, ensuring a secure and seamlessly integrated IT environment.

Exam description

The Red Hat Certified Specialist in Identity Management exam (EX362) evaluates your expertise in creating, configuring, and managing Red Hat Enterprise Linux authentication services. It also assesses your ability to integrate these services with various Red Hat and non-Red Hat products and technologies. Successfully passing this exam earns you the designation of a Red Hat Certified Specialist in Identity Management and contributes towards achieving the esteemed title of Red Hat Certified Architect (RHCA). The exam is aligned with the latest standards, based on Red Hat Enterprise Linux 9, and incorporates Red Hat Identity Management 4.8 technologies.

Audience Exam:

The Red Hat Certified Specialist in Directory Services and Authentication is relevant for the following audiences:

  • Any Red Hat Certified Engineer (RHCE) aspiring to attain the prestigious title of Red Hat Certified Architect (RHCA).
  • System administrators aiming to showcase their proficiency in configuring authentication services and establishing connections with other products.

Prerequisites:

To pursue the Red Hat Certified Specialist in Directory Services and Authentication, consider the following prerequisites:

  • Hold a Red Hat Certified System Administrator (RHCSA) certification or possess equivalent work experience and skills. (Red Hat Certified Engineer (RHCE) certification is recommended.)
  • Complete the Red Hat Security: Identity Management and Active Directory Integration (RH362) course or demonstrate equivalent work experience.
  • Familiarize yourself with the exam objectives outlined for the Red Hat Certified Specialist in Directory Services and Authentication.

Study points for the exam

To succeed in the Red Hat Certified Specialist in Identity Management exam (EX362), you should be proficient in the following tasks:
    1. Install and configure Red Hat Identity Management (IdM)
      • Utilize scripts or Ansible Automation Platform for IdM installation
      • Establish and configure a replica IdM server
    2. User and Policy Management
      • Create users, groups, and policies within the IdM environment
    3. Single Sign-On (SSO)
      • Implement SSO
      • Set up an SSO client
      • Verify SSO client operation
    4. IdM Client Configuration
      • Install and configure IdM clients
      • Configure Kerberized services
    5. Certificate Authority Management
      • Manage the IdM integrated certificate authority
      • Configure and oversee a certificate authority
    6. Security Configuration
      • Create secret vaults
      • Implement user policies and access configurations
      • Set up roaming or automounted home directories
      • Utilize Ansible Tower for IdM user configuration
    7. Integration with External Services
      • Configure IdM as an LDAP backend for external services such as Red Hat Satellite Server or Ansible Automation Platform automation controller
    8. Maintenance and Backup
      • Maintain IdM services
      • Configure NTP and firewall on all IdM components
      • Conduct backup operations without service interruption
    9. Exam Note: Configurations must persist after reboot without intervention, as with all Red Hat performance-based exams.

1. Preparation:

Red Hat recommends considering enrollment in Red Hat Security: Identity Management and Active Directory Integration (RH362) as part of your preparation for the exam. However, class attendance is optional, and candidates can opt to take only the exam.

While participating in Red Hat classes can contribute to exam readiness, success is not guaranteed by attendance alone. A combination of prior experience, hands-on practice, and innate aptitude are crucial factors for success.

Various books and resources on system administration for Red Hat products are available, though Red Hat does not officially endorse specific materials as preparation guides. Nevertheless, additional reading can enhance understanding and provide valuable insights.

2. Exam format:

The exam is a hands-on assessment of competencies needed to set up and administer Red Hat directory services. Candidates are tasked with configuring and managing these services, as well as integrating other products to utilize them. Evaluation is based on meeting predefined objective criteria. This performance-based testing approach requires candidates to execute tasks resembling real-world scenarios they might encounter in their professional roles..

3. Scores & Reporting:

Exam scores are officially provided through Red Hat Certification Central. Direct reporting by examiners or training partners to candidates is not authorized by Red Hat. Typically, scores are available within 3 U.S. business days. The results indicate total scores without item-specific performance details, and additional information requests will not be fulfilled.

Prove your skills and knowledge

Earning the title of a Red Hat Certified Specialist in Identity Management signifies the candidate’s proficiency in key areas:

  1. Install and Configure Red Hat Identity Management:
    • Showcase expertise in seamlessly installing and configuring Red Hat Identity Management, establishing a robust foundation for identity management.
  2. Install and Configure Red Hat Identity Management Clients:
    • Demonstrate proficiency in the installation and configuration of Red Hat Identity Management clients, ensuring smooth integration across diverse network environments.
  3. Configure Identity Management–Related Services:
    • Display adeptness in configuring various identity management-related services, highlighting a comprehensive understanding of the broader identity management landscape.

 

This certification is a testament to the candidate’s ability to implement and manage Red Hat Identity Management solutions effectively, making them a valuable contributor in environments where identity and access management play a critical role in operational efficiency and security.

Is this certification right for you?

The Red Hat Certified Specialist in Identity Management is specifically tailored for individuals within the following roles:

  1. System Administrators and Developers:

    • Ideal for those looking to validate their expertise in Red Hat® OpenShift Container Platform skills, showcasing proficiency in identity management aspects.
  2. Red Hat Certified System Administrators (RHCSA) or Equivalent:

    • Recommended for individuals with an RHCSA certification or equivalent skills, offering a specialized pathway to demonstrate advanced identity management capabilities.
  3. Red Hat Certified Engineers (RHCEs) Pursuing RHCA:

    • Particularly beneficial for RHCEs on the path to earning the prestigious Red Hat Certified Architect (RHCA) credential, providing a focused skill set in identity management.

This certification is designed to meet the needs of a diverse audience, ranging from those with foundational skills to seasoned professionals aspiring to advance their expertise in identity management within Red Hat environments.

 Test Your Skills and Knowledge

Red Hat Certified Specialist in Identity Management Exam (EX362): Elevate Your Expertise in Identity Management

The best way to learn is to do

Strategic Training for Success: Red Hat’s Recommended Courses on the Path to Becoming a Red Hat Certified Specialist in Directory Services and Authentication”

Prepare diligently for the journey to becoming a Red Hat Certified Specialist in Directory Services and Authentication by enrolling in the following recommended courses:

  1. Red Hat Security: Identity Management and Active Directory Integration (RH362):

    • Immerse yourself in the world of identity management and gain mastery in the seamless integration of Active Directory, crucial skills for success in the certification.
  2. Red Hat Satellite 6 Administration (RH403):

    • Elevate your administrative proficiency by mastering Red Hat Satellite 6, a pivotal component for effective directory services and authentication.

These meticulously chosen courses are designed to provide not only comprehensive knowledge but also practical insights, ensuring your readiness to conquer the certification exam and excel in the realm of directory services and authentication.

SHARE :

On-site Training is available

If you would like to get your entire team trained, we can do it on your premises, in-person or remote.