Red Hat Security: Identity Management and Active Directory Integration

Live Online (VILT) & Classroom Corporate Training Course

Learn to configure, manage, and integrate Red Hat Identity Management with Microsoft Active Directory for secure and scalable centralized authentication.

How can we help you?

  • CloudLabs
  • Projects
  • Assignments
  • 24x7 Support
  • Lifetime Access

Red Hat Security: Identity Management and Active Directory Integration

Overview

This course equips IT professionals with the skills to securely configure, manage, and integrate centralized identity services using Red Hat Identity Management and Active Directory.

Objectives

At the end of Red Hat System Administration II training course, participants will be able to

  • Design and deploy scalable and resilient IdM topologies

  • Manage users, access, certificates, and secure authentication methods

  • Configure smart cards, 2FA, and single sign-on

  • Integrate Red Hat Identity Management with Microsoft Active Directory

  • Use IdM with Red Hat Satellite and Ansible Automation Platform

  • Troubleshoot and plan disaster recovery for IdM environments

Prerequisites

  • Required: Red Hat Certified Engineer (RHCE) certification or equivalent skills
  • Recommended: Completion of the skills assessment for RH362

Course Outline

Module 1: Introduction to Identity Management2025-07-03T12:02:56+05:30
  • Identity Management architecture and capabilities in Red Hat Enterprise Linux
  • Core technologies: SSSD, PAM, Kerberos, PKI
  • IdM installation for servers, replicas, and clients
Module 2: Designing and Deploying IdM Topologies2025-07-03T12:11:33+05:30
  • Planning scalable and resilient IdM topologies
  • Implementing high-availability across single-site and geo-distributed deployments
  • Integrating and managing DNS and Certificate Authority (CA) services
Module 3: User and Access Management2025-07-03T12:14:02+05:30
  • Centralized user provisioning and account control
  • Configuring Sudo, HBAC, and RBAC policies
  • Managing vaults, secrets, certificates, and keys
Module 4: Advanced Authentication and Security2025-07-03T12:16:43+05:30
  • Smart card authentication and two-factor configuration
  • Implementing Single Sign-On (SSO) solutions
  • Securing services with Kerberos and TLS
Module 5: Integration with Active Directory and Red Hat Tools2025-07-03T12:21:54+05:30
  • Configuring cross-forest trust with Microsoft Active Directory
  • Mapping POSIX attributes using ID views
  • Integrating with Red Hat Satellite and Ansible Automation Platform
Module 6: Troubleshooting and Disaster Recovery2025-07-03T12:24:15+05:30
  • Diagnosing and resolving common IdM issues
  • Planning and executing IdM backup and recovery
  • Hands-on review and full deployment walkthrough
2025-07-03T12:04:46+05:30
Go to Top