NetIQ Access Manager Foundations (3-7230)

 

Course Overview

This fundamental class teaches the basic administration of Access Management. This role-based training approach is from the perspective of a team of security administrators building a solution within Access Manager from scratch, implementing an innerweb and access to and from the internet through a series of proxy services.

It explores security scenarios through encrypted technologies, certificate management, authentication, and authorization. Along the way, learning how important it is to protect the network using Risk Services to stealthily determine the risk of each login.

You learn data injections, auto form fill, multi-homing, role-based decision making, along with a host of other features of the software.

This course provides demonstrations and hands-on activities using a practical, solutions-based approach.

Highlights
  • Configuring the console.
  • Building Reverse Proxies.
  • Identifying and configuring x-509 certificates.
  • Configuring Risk Management.
  • Configuring policies with role-based decision making.
  • Introducing the Identity Injection.

Who should attend

All members of the project teams, including security, architects, project managers, developers, administrators, and operations personnel.

Prerequisites

To be successful in this course, you should have the following prerequisites or knowledge:

  • A basic understanding of the concept of Access Management.
  • An understanding of NetIQ eDirectory, NetIQ Identity Manager, and Linux.
  • A familiarity with basic web services, HTTP Requests and Responses, HTML tags, and server-side dynamic content (JSP, ASP, or similar), and having familiarity with PHP, JavaScript, ECMAscript, or RESTful scripting is required.

Course Objectives

On completion of this course, participants should be able to:

  • Identify the Access Manager solution.
  • Describe the difference between appliance and component installations.
  • Build and configure a Reverse Proxy.
  • Configure SSL for a self-signed environment.
  • Identify Risk Management.
  • Create and utilize Classes, Methods, and Contracts, and how to use them in Policy and Proxies.
  • Create and utilize role-based decision making

Course Content

Chapter 1: Configuring the Administration Console
  • Describing Access Manager concepts.
  • Describing Access Manager deployment options.
  • Configuring the Administration Console.
  • Additional Adjustments.
  • Troubleshooting installation issues.
Chapter 2: Configuring Access Gateway Service
  • Connecting the IDP to the IDM Server.
  • Describing the NetIQ Access Manager clusters.
  • Explaining Access Gateway configuration.
  • Adding an advanced File Configurator.
  • Adding Additional Administrators.
Chapter 3: Rewriting Web Code
  • Rewriting Web Content.
  • Validating Web Content.
  • Configuring the Pin List and other options.
Chapter 4: Configuring Reverse Proxies
  • Configuring Network Settings to support multiple websites.
  • Explaining Proxy configuration.
  • Explaining Web Proxy logging.
  • Describing Proxy logic.
  • Creating additional power users.
Chapter 5: Enable and Protect NAM Websites
  • Explaining the SSL.
  • Describing the SSL mechanics.
  • Enabling SSL inside Proxies.
  • Enabling and protecting NAM websites with SSL Certs.
Chapter 6: Authentication
  • Explaining the Authentication Framework.
  • Authenticating to a Site.
  • Describing Classes, Methods, and Contracts.
Chapter 7: Configuring Domain and Multi-Homing
  • Preparing for Multi-Homing.
  • Configuring Multi-Homing.
  • Explaining web server acceleration.
  • Identifying the types of Proxy options.
  • Configuring the Proxy.
Chapter 8. Mitigating Risk
  • Introducing the Policy.
  • Creating and managing a Risk Policy.
  • Explaining how Risk works?
  • Detailing the Integration.
Chapter 9: Modifying the Portal Interface
  • Customizing the Identity Server pages.
  • Customizing the Identity Server messages.
  • Customizing the Access Gateway error messages.
  • Customizing the Access Gateway logout requests.
Chapter 10: Using Appmarks and Enabling Mobile
  • Explaining the Web Access portal
  • Configuring Mobile Access.
Chapter 11: Applications Configuration Using Roles
  • Reviewing Policy.
  • Identifying the Access Manager roles.
  • Explaining the Access Manager Authorization.
  • Explaining how it works (Business Case).
  • Using the Policy Troubleshooting tools.
  • Troubleshooting steps.
Chapter 12: Advanced Applications Configuration
  • Overview of Identity Injection.
  • Explaining basic and custom Header Options.
  • Using Form Fill Options.
  • Using Form Fill Shared Secrets.

Prices & Delivery methods

Online Training

Duration
4 days

Price
  • on request
Classroom Training

Duration
4 days

Price
  • on request

Currently there are no training dates scheduled for this course.