Our Blog

BY : ipsr edu 0 comment

RH362 -Identity Management and Active Directory Integration

The demand for secure access poses a serious challenge to computer professionals. System Administrators must balance ease of use considerations with the need to protect valuable business data and a wide range of access levels. Enterprise and datacenter management primarily includes Linux and Windows systems and users requiring shared access across all systems and access protocols, regardless of the source.

Identity and access management tools must successfully handle complex user provisioning, lifecycle management, certificate-based trusts, and the ability to perform Single Sign-On across local and remote networks, services, and devices. Identity Management (IdM) in Red Hat Enterprise Linux solves these business security needs.This course, Red Hat Security: Identity Management and Active Directory Integration (RH362), is the first course of a portfolio of security courses to be released over the next year.


The newest Red Hat Training course, Red Hat Security: Identity Management and Active Directory Integration (RH362), provides the skills to configure and manage Identity Management (IdM) in Red Hat Enterprise Linux, including the capabilities most requested by customers; Active Directory trusts, multi-product federation, configuration management, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance.

Learning Path

An RHCSA is required for any of our security courses as it will allow students to utilize the full Linux security administration skill set.  An RHCE is highly recommended as it will provide the essential HTTP and DNS service skills. Red Hat Training and Certification will be releasing four security courses this year, any of which can be taken after an RHCSA is obtained.

Technical Overview

The Enterprise Computing landscape has matured and evolved tremendously in the last decade.  IT professionals are focused on managing an ever-expanding universe of applications, servers, data centers and clouds.  Red hat Enterprise Linux has similarly matured, becoming ubiquitous in corporate servers, cloud infrastructure, and deployable application instance images.  To operate at scale, systems administrators and operators are required to securely manage users, applications, policies and tasks at the enterprise level, not individual systems.

In this Red Hat Security: Identity Management and Active Directory Integration (RH362) course, students will learn the skills to configure and manage IdM, the comprehensive Identity Management (IdM) solution that is bundled with Red Hat Enterprise Linux.  IdM is designed and tuned to provide domain-based user and security policy management explicitly for Linux-based systems, while allowing management relationships with systems utilizing other operating systems, including Microsoft Windows, UNIX and OS X.

Attendees are expected to have sufficient Linux administration skills to configure and maintain system and network services, install packages and utilize web-served and browser-based applications.  Students will install and configure both the IdM server and client packages, learning to choose between using integrated IdM components or connecting to external identity management services already existing in enterprise environments.  The course will use a combination of IdM command line tools and web-based interfaces; most tasks and exercise can use either. After installation, students will configure users, rules, policies and permissions that make up the core functionality of an identity management solution, then go into deeper technical detail in the next two chapters on two foundation technologies; Kerberos and Public Key Infrastructure.

Much of the corporate world today uses Microsoft’s Active Directory (AD) Server to perform a similar Identity management role for Microsoft Windows systems and users.  Student will learn to build connections between IdM and AD to facilitate common Enterprise Linux security rules and permissions to be applied equally to both Linux and Microsoft Windows users.  This course will also cover ongoing IdM maintenance, operations and disaster recovery. Students will install and configure Single Sign On with IdM, and extend login security by setting up 2 Factor Authentication and emulating smartcard behavior.

IdM can be used as the shared user database and authentication mechanism for other Red Hat products, including Satellite Server and Ansible Tower.  Exercises in this course will allow students to practice configuring using IdM as an integrated authentication service. In the final topic, students will learn how to scale Idm for resiliency and performance by building replicas in a scalable topology.  The course ends with a Comprehensive Review, three exercises that practice the main learning objectives presented in the course: installing servers and clients, creating replicas, and configuring users, rules and policies designed for strong security.

This course is available in Classroom, Virtual Training, Online Learning and also with the Red Hat Learning Subscription.

List of Authors

Leave a Reply

Your email address will not be published.