0345 4506120

Identity Management

Strengthen your organization’s security and simplify access to critical resources by implementing the appropriate Identity Management (IdM) and Identity Access Management (IAM) strategies. With this training course, you learn how to implement Single Sign-On (SSO) via a solid foundation based on industry-standard Public Key Infrastructure (PKI) and Federated Identity Management (FIM).

Learning Objectives

You Will Learn How To

  • Implement identity/access management to control access to IT resources
  • Build a Public Key Infrastructure (PKI) to manage trust between Identity Providers (IdPs) and Relying Parties (RPs)
  • Streamline identity authentication for applications with claims
  • Seamlessly authenticate to the cloud with Federated Identity Management (FIM)
  • Synchronise identities among disparate authentication stores with Microsoft Identity Manager (MIM) 2016

Pre-Requisites

Requirements:

  • Familiarity with security issues at the level of:    
    • Course: System and Network Security Introduction
  • Experience with Windows operating system

Course Content

Course Outline

Managing Identities in a Digital World

Identity and its theft

  • Eliminating vulnerabilities in identification and authentication processes
  • Compromising multiple identities
  • Exploiting Object ID OID identities

Ensuring strong authentication

  • Enforcing authentication with biometrics
  • Requiring multifactor authentication with smart cards
  • Migrating to virtual smart cards and Trusted Platform Module TPM

Implementing Single Sign-On (SSO)

  • Interoperating via open industry standards, federated logon and claims
  • Applying Kerberos identities in a domain

Surveying IdM solutions

  • Making identities portable with Secure Tokens
  • On-premises and cloud-based identity management

Synchronising Identities

Discovering identity stores

  • Exploring identities in Kerberos tickets and AD attributes
  • Identifying identities in SQL databases

Demystifying MIM 2016

  • Importing identities from Connected Data Source CDS into Connector Space CS
  • Synchronising identities into Metaverse MV
  • Managing identities and rules with the SharePoint MIM Portal

Implementing Identities in a PKI

Inside PKI X.509 v3 certificates

  • Expiring identities with certificate lifetimes
  • Verifying identities with Subject Alternative Name
  • Binding identities to certificates

Establishing trust via certificates

  • Validating trust with digital signatures
  • Creating entity trust by importing a root CA
  • Distributing trust to subordinate CAs
  • Flowing trust with domain Group Policy Object GPO

Building an enterprise trust hierarchy

  • Publishing Certificate Revocation Lists (CRLs)
  • Increasing security with an offline root CA
  • Accessing directories with LDAP
  • Configuring Online Certificate Status Protocol OCSP

Trusting an external identity provider

  • Forming a certificate chain
  • Locating the CA Trust Anchor

Expanding Trust with Federated Identity Management

Federated management with Microsoft AD FS 3.0

  • Authenticating with a trusted Identity Provider IdP
  • Controlling access with claims
  • Verifying SAML tokens with Relaying Party RP
  • Striving for universally interoperable and portable identity

Creating claims-aware applications

  • Building claims-aware applications with Windows Identity Foundation WIF
  • Abstracting SAML, WS-Trust and WS-Federation protocols

Trusting external Identity Providers

  • Extending ADFS externally with Web Application Proxy WAP
  • Mapping external ADFS namespaces with DNS

Delivering Identities to the Cloud

Windows Azure federation

  • Extending on-premises Active Directory (AD) to Azure AD
  • Implementing SSO in Azure for Office 365 and  SaaS applications

Amazon AWS federation

  • Authenticating with Amazon IAM roles
  • Microsoft federated log-in to Amazon services using SAML tokens

Mobile Identity Management with BYOD

Enrolling mobile devices

  • Joining devices with Workplace Join
  • Enacting Device Registration Services DRS

Planning a Federated Identity Roadmap

  • Achieving the FICAM IdM vision
  • Creating organisational identity management policy

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the request service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.

 

Online Courses

You may prefer an online course if you are looking for a flexible and cost-effective solution. Online courses allow you to study at your own pace, at a time that suits you.

We have the following eLearning options available:

Virtual Classroom

Virtual classrooms provide all the benefits of attending a classroom course without the need to arrange travel and accomodation. Please note that virtual courses are attended in real-time, commencing on a specified date.

Virtual Course Dates

Our Customers Include