Identity and Access Management Training
Level: Intermediate
Course #: 2056
Course info - Prices, Enrollment
This identity and access management course will teach you to strengthen your organization’s security and simplify access to critical resources by implementing the appropriate Identity Management (IdM) and Identity Access Management (IAM) strategies. You will learn how to implement Single Sign-On (SSO) via a solid foundation based on industry-standard Public Key Infrastructure (PKI) and Federated Identity Management (FIM).
Key Features of this Identity Access Management Training:
After-course instructor coaching benefit
You Will Learn How To:
Implement identity/access management to control access to IT resources
Build a Public Key Infrastructure (PKI) to manage trust between Identity Providers (IdPs) and Relying Parties (RPs)
Streamline identity authentication for applications with claims
Seamlessly authenticate to the cloud with Federated Identity Management (FIM)
Synchronize identities among disparate authentication stores with Microsoft Identity Manager (MIM) 2016
Goals Live, Instructor-Led – Live, Online Training
Important Identity Access Management Course Information
Requirements
Familiarity with security issues at the level of: Course 468, {course:468}
Experience with Windows operating system
Identity Access Management Course Outline
Managing Identities in a Digital World
Identity and its theft
Eliminating vulnerabilities in identification and authentication processes
Compromising multiple identities
Exploiting Object ID OID identities
Ensuring strong authentication
Enforcing authentication with biometrics
Requiring multifactor authentication with smart cards
Migrating to virtual smart cards and Trusted Platform Module TPM
Implementing Single Sign-On (SSO)
Interoperating via open industry standards, federated logon and claims
Applying Kerberos identities in a domain
Surveying IdM solutions
Making identities portable with Secure Tokens
On-premises and cloud-based identity management
Synchronizing Identities
Discovering identity stores
Exploring identities in Kerberos tickets and AD attributes
Identifying identities in SQL databases
Demystifying MIM 2016
Importing identities from Connected Data Source CDS into Connector Space CS
Synchronizing identities into Metaverse MV
Managing identities and rules with the SharePoint MIM Portal Implementing Identities in a PKI
Inside PKI X.509 v3 certificates
Expiring identities with certificate lifetimes
Verifying identities with Subject Alternative Name
Binding identities to certificates
Establishing trust via certificates
Validating trust with digital signatures
Creating entity trust by importing a root CA
Distributing trust to subordinate CAs
Flowing trust with domain Group Policy Object GPO
Building an enterprise trust hierarchy
Publishing Certificate Revocation Lists (CRLs)
Increasing security with an offline root CA
Accessing directories with LDAP
Configuring Online Certificate Status Protocol OCSP
Trusting an external identity provider
Forming a certificate chain
Locating the CA Trust Anchor
Expanding Trust with Federated Identity Management
Federated management with Microsoft AD FS 3.0
Authenticating with a trusted Identity Provider IdP
Controlling access with claims
Verifying SAML tokens with Relaying Party RP
Striving for universally interoperable and portable identity
Creating claims-aware applications
Building claims-aware applications with Windows Identity Foundation WIF
Abstracting SAML, WS-Trust and WS-Federation protocols
Trusting external Identity Providers
Extending ADFS externally with Web Application Proxy WAP
Mapping external ADFS namespaces with DNS
Delivering Identities to the Cloud
Windows Azure federation
Extending on-premises Active Directory (AD) to Azure AD
Implementing SSO in Azure for Office 365 and SaaS applications
Amazon AWS federation
Authenticating with Amazon IAM roles
Microsoft federated log-in to Amazon services using SAML tokens
Mobile Identity Management with BYOD
Enrolling mobile devices
Joining devices with Workplace Join
Enacting Device Registration Services DRS
Planning a Federated Identity Roadmap
Achieving the FICAM IdM vision
Creating organizational identity management policy