bitkoo keystone training class

2

Upload: jagadeesh44

Post on 24-Apr-2015

32 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: BiTKOO Keystone Training Class

Call 888-4-BiTKOO or email [email protected] to recieve a free quote on DB-Wall’s customized Traning Course

Page 2: BiTKOO Keystone Training Class

Section 3 – Installation, Functionality -Hardware considerations -Ability to install and configure Keystone -Identify Keystone features and functions related to the installation and configuration steps

Section 4 – Integration -Application integration options -Application filters -Integration with 3rd party IAM tools -How to achieve single sign on -Directory abstraction layer configuration and extensibility

Section 5 – Security Policy -Security policy concepts (from coarse to fine grained)

-How to leverage user attributes -Role definitions -Role to policy mapping -Policy modeling -Policy life cycle considerations -Keystone expressions -Dynamic assignments -SOD rules

Course Agenda

K E YS T O NE Keystone has become known as the best of breed fine-grained authorization management solution. It provides a consistent approach for authorization management, and is implemented as set of web services, callable across the network to automate the granting of user access to enterprise information. Keystone controls access across all classes of users (employees, partners, customers, and contractors) and all systems for which access must be managed (Web, client-server, mainframe, off the shelf and custom-built).

For more information on any of

our products or services please

visit us on the Web at:

www.bitkoo.com

or

Call us at 888-4-BiTKOO

International:

+1-818-985-4700

Section 1 – Problem Domain -What is authorization management? -Articulate the authorization management challenge

-Application security concepts -How Keystone Authorization Management works

-Understand and describe the benefits of Keystone

Section 2 – Architecture -Keystone architecture -Architecting for high availability and performance

-Environment appropriate architecture

Section 6 – Administration -Delegated administration concepts -Keystone protecting Keystone -Admin roles Section 7 – Audit and Reporting -Audit trail database -Complete understanding of Keystone logging and reporting capabilities

-Ability to leverage 3rd party reporting tools -Review of client specific reporting requirements and Keystone alignment

Section 8 – Best Practices -Best practices guidelines and overview -Prioritizing applications for Keystone -integration

-Building the project team -Filling gaps with services -Customer specific questions/answers