Course Content
RSA Access Manager Overview
- High level description of RSA Access Manager and its contribution to access management
RSA Access Manager Architecture
- Description and functions of the Primary Servers; Web and Application Server Agents
- Data Flow for the Runtime and Administrative operations
- Description of how RSA Access Manager fits into a distributed security model
Installation and Configuration
- Description of RSA Access Manager system requirements and pre - installation readiness tasks
- Installation procedure, options, and recommended practices
- Installation of Access Manager Servers, LDAP Data Adapter, Administrative Console, and Web and Application Server Agents
- Configuration of Web Server for Single Sign-On
Managing Resources
- Discussion of how resources (Web sites, Applications, etc.) are protected using RSA Access Manager
- focusing on selectivity and granularity in various situations
- Registration of Web Servers and definition of Applications
- Discussion of Virtual Web Server Hosts
- Configuration of Web Server for virtual hosts
Participantd Administration
- Discussion of the administrative structure that is possible in an RSA Access Manager installation
- Use of Administrative Groups and ownership hierarchy of administrators, users, and objects
- Examination of Administrative Roles and responsibilities
Managing the Organization
- Policy control for user authentication and passwords
- Methodology of structuring users, groups, user attributes, and properties
- Creation of user properties and addition of users to groups
Resource Protection and Authentication
- Discussion of Authentication Methods used to protect resources; Form - based vs. challenge/response authentication; Chaining and combining forms
- Discussion of how resources are defined to allow granular protection
- Use of RSA Access Manager Entitlements and Smart Rules to selectively manage access to resources
- How to manage conflicts among Smart Rules and between Smart Rules and Entitlements
- Configuration of Access Manager for external authentication and URL retention
Troubleshooting
- Examination of the log files and use of special configuration parameters to control log detail
- Configuration of servers for centralized logging
- Configuration of Network Management
- Discussion of approaches to user and system troubleshooting
Development Tools
- Discussion of the various Runtime, Administrative, and Web Agent Extension API tools that are available
- Examination and implementation of JAVA coding examples
Single Sign-On
- Discussion of the function and objectives of creating a single sign-on environment
- Explanation of the differences and challenges of 'Intra-' vs. 'Inter-' site single sign-on
- Configuration of Access Manager for SSO and ISSO
Distributed Authorization
- Discussion of achieving redundant functionality and failover
- Explanation of the differences in Standard Mode vs. Distributed Mode failover
- Test of centralized logging