BiTKOO Keystone Training Class
-
Upload
jagadeesh44 -
Category
Documents
-
view
32 -
download
4
Transcript of BiTKOO Keystone Training Class
Call 888-4-BiTKOO or email [email protected] to recieve a free quote on DB-Wall’s customized Traning Course
Section 3 – Installation, Functionality -Hardware considerations -Ability to install and configure Keystone -Identify Keystone features and functions related to the installation and configuration steps
Section 4 – Integration -Application integration options -Application filters -Integration with 3rd party IAM tools -How to achieve single sign on -Directory abstraction layer configuration and extensibility
Section 5 – Security Policy -Security policy concepts (from coarse to fine grained)
-How to leverage user attributes -Role definitions -Role to policy mapping -Policy modeling -Policy life cycle considerations -Keystone expressions -Dynamic assignments -SOD rules
Course Agenda
K E YS T O NE Keystone has become known as the best of breed fine-grained authorization management solution. It provides a consistent approach for authorization management, and is implemented as set of web services, callable across the network to automate the granting of user access to enterprise information. Keystone controls access across all classes of users (employees, partners, customers, and contractors) and all systems for which access must be managed (Web, client-server, mainframe, off the shelf and custom-built).
For more information on any of
our products or services please
visit us on the Web at:
www.bitkoo.com
or
Call us at 888-4-BiTKOO
International:
+1-818-985-4700
Section 1 – Problem Domain -What is authorization management? -Articulate the authorization management challenge
-Application security concepts -How Keystone Authorization Management works
-Understand and describe the benefits of Keystone
Section 2 – Architecture -Keystone architecture -Architecting for high availability and performance
-Environment appropriate architecture
Section 6 – Administration -Delegated administration concepts -Keystone protecting Keystone -Admin roles Section 7 – Audit and Reporting -Audit trail database -Complete understanding of Keystone logging and reporting capabilities
-Ability to leverage 3rd party reporting tools -Review of client specific reporting requirements and Keystone alignment
Section 8 – Best Practices -Best practices guidelines and overview -Prioritizing applications for Keystone -integration
-Building the project team -Filling gaps with services -Customer specific questions/answers