1 - Install Red Hat Identity Management
Describe and install Red Hat Identity Management (IdM).
1 - Introduction to troubleshooting
Describe a generalized strategy for troubleshooting.
2 - Centralize Identity Management
Explain the IdM server services, explore IdM clients access methods, and install an IdM client.
2 - Take proactive steps to prevent small issues
Prevent small issues from becoming large problems by employing proactive system administration techniques.
3 - Authenticate identities with Kerberos
Define the Kerberos protocol and configure services for Kerberos authentication.
3 - Troubleshoot boot issues
Identify and resolve issues that can affect a system's ability to boot.
4 - Identify hardware issues
Identify hardware problems that can affect a system’s ability to operate.
4 - Integrate IdM with Active Directory
Create a trust relationship with Active Directory.
5 - Control user access
Configure users for authorized access to services and resources.
5 - Troubleshoot storage issues
Identify and fix issues related to storage.
6 - Manage a public key infrastructure
Manage certificate authorities, certificates, and storing secrets.
6 - Troubleshoot RPM issues
Identify and fix problems in, and using, the package management subsystem.
7 - Maintain IdM operations
Troubleshoot and recover Identity Management.
7 - Troubleshoot network issues
Identify and resolve network connectivity issues.
8 - Integrate Red Hat products with IdM
Configure major services to share the IdM authentication database.
8 - Troubleshoot application issues
Debug application issues.
9 - Deal with security issues
Identify and fix issues related to security subsystems.
9 - Install scalable IdM
Construct a resilient and scalable Identity Management topology.
10 - Troubleshoot kernel issues
Identify kernel issues and assist Red Hat Support in resolving kernel issues.
11 - Red Hat Enterprise Linux Diagnostics and Troubleshooting comprehensive review
Practice and demonstrate knowledge and skills learned in Red Hat Enterprise Linux Diagnostics and Troubleshooting.
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Identity management specialist or engineer
Access management specialist or engineer
Web application developer
Be certified as a Red Hat Certified System Administrator (RHCSA) (required)
Be certified as a Red Hat Certified Engineer (RHCE) (recommended, but not required).