RSA SecurID Access II - Infrastructure Administration and Tuning

Document created by Joseph Cantor Employee on Oct 3, 2019Last modified by Joseph Cantor Employee on Nov 6, 2019
Version 4Show Document
  • View in full screen mode

Schedule & Register

Schedule Only

On-Demand

 

 

In order to register for a class, you need to first create a Dell Education account

If you need further assistance, contact us

 

 

Summary

This training course describes how to deploy and install RSA cloud application and endpoint security components.Hands-on exercises paired with practical use cases provide a rich educational experience to quickly gain expertise in deploying an RSA SecurID Access system.

 

 

Overview

This course is designed to help accelerate the learning curve and provide practical experience for individuals planning, deploying, and installing components of an RSA SecurID Access system. Participants leave this training with the knowledge and experience of bringing components to an operational state and performing various configurations to match component operations to an organization’s security plan.
Extensive hands-on exercises performed in a virtual lab environment provide experience to reinforce important concepts and build practical skills.

 

Audience

IT, System, or Security Engineers who may be responsible for implementing an RSA SecurID Access system.


Delivery Type
Classroom

Virtual Classroom

On-Demand Classroom

 

Duration
4 days

 

Prerequisite Knowledge/Skills

Students should have a fundamental conceptual understanding of network security and multi-factor authentication. Students should be familiar with software installation in both Windows and UNIX/Linux environments and be familiar with IP, networking, and virtualization configurations.
Most students find it helpful to have completed RSA SecurID Access Administration I training prior to attending this course.
Students must provide their own iOS or Android device (smartphone or tablet) to complete exercises involving the RSA SecurID Access Authenticate mobile app.

 

 

Learning Objectives

Upon successful completion of this training, participants should be able to:

  • Understand the architecture and deployment options of an RSA SecurID Access system and components
  • Perform configurations required to make system components operational
  • Understand the configuration options to support a variety of security and access protection scenarios
  • Offer guidance and support for user administrators 
  • Know how to approach system troubleshooting

 

Course Outline

  • Product and Architecture Overview
    • System components
    • Component interaction and communication
  • Deployment Scenarios
    • Planning an RSA SecurID Access implementation
  • RSA Authentication Manager Deployment
    • Authentication server deployment options
    • Authentication server Quick Setup
  • RSA Authentication Manager System-Level Configurations
    • Performing System and Instance configurations
  • RSA Cloud Authentication Service Deployment
    • Deploying an Identity Router
    • Connecting to the RSA Cloud Authentication Service
  • RSA Cloud Authentication Service System-Level Configurations
    • Setting up administrative accounts
    • Editing network configurations
    • Application Access Policy overview
  • User Authentication Overview
    • Authenticator types
    • Authenticator operations and management tasks
  • Connecting to Identity Sources
    • Managing connections to LDAP/Active Directory
    • User management and reporting capabilities
  • User Self-service
    • User self-service options
    • Installing a Web Tier server
  • Authentication Agents
    • Installing Windows Local Access agent
    • Configuring Windows agent features
    • Installing authentication agent for PAM
    • Installing Web Access agents – Windows and Linux
  • Setting up the Application Portal
    • Configuring SAML, HTTP Federation Proxy, and Trusted Header application types
    • Configuring Portal authentication options

 

  • Application Portal Policy Overview
    • Configuring and managing access policies
  • Cloud Authentication Service Integrated Windows Authentication
    • Configuring Integrated Windows Authentication for Application Portal users
  • Authentication Server – Cloud Authentication Service Integration
    • Configuring additional authentication with RSA SecurID
    • Using an RSA SecurID Authenticate Tokencodes through RSA
  • Authentication Manager agents
  • RADIUS Configuration
    • Configuring RADIUS Clients and user profiles in RSA Authentication
  • Manager and in the RSA Cloud Authentication Service
  • System Utilities and Troubleshooting
    • Using RSA Authentication Manager Command Line Utilities
    • Setting up the RSA Authentication Manager MMC Snap-in
    • Configuring an RSA Authentication Manager Trusted Realm
    • Viewing RSA Authentication Manager Log Files
    • Generating a Cloud Authentication Service Log Bundle
    • Accessing the Identity Router Operating System
    • Database maintenance and backups
  • High Availability Configurations
    • Installing an RSA Authentication Manager Replica Server
    • Deploying an additional Identity Router

 

 

Schedule & Register

Schedule Only On-Demand

 

 

In order to register for a class, you need to first create a Dell Education account

If you need further assistance, contact us

Attachments

    Outcomes