RSA Governance & Lifecycle Implementer Boot camp
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content
Access Training
for RSA Employees
If you need further assistance, contact us
If you are an RSA Partner, please Click Here
Course Description
This training material and hands-on lab describe how to implement the RSA Governance and Lifecycle system, establish a well-defined governance foundation, and configure lifecycle capabilities to maximize efficiency, mitigate risks, and simplify the responsibilities of RSA G&L administrators and end-users in future lifecycle management activities.
This training focuses on implementers who want to start configuring RSA G&L by enabling them to understand how to start approaching the Identity Governance & Administration problem at the organization and analyzing company resources to be able to decide what is the most efficient implementation that will match the company’s requirements.
Delivery Type
|
Duration
|
Prerequisite Knowledge
Prior to attending this class, students are encouraged to complete the Foundation Training Courses:
Learning Objectives
Upon completion of this training, the student should be able to:
- Plan and implement a well-defined governance foundation to streamline and enhance all lifecycle capabilities by having an oversight on all system functions.
- Plan and onboard identities by creating directories, managing attributes, and configuring unification settings.
- Specify a delegated authentication source to allow various end users to log in and interact with RSA G&L.
- Set up the AFX system and configure its capabilities.
- Configure the Access Request Manager to help streamline various system processes related to submitting requests and fulfillment of requests.
- Configure the password management component to allow for self-service password resets, and set the criteria for identity confirmation.
- Create and Customize workflows to fulfill the organization’s policies.
- Create several rules to oversee various use cases such as the Joiner Mover Leaver process, Segregation of Duties, and more.
- Maximize overall efficiency by streamlining all system interactions and functions with the BRM for managing roles and set Role-Based Access Control measures.
- Configure and utilize Web Services to perform various system actions.
Course Outline
Module # |
Module name |
Learning Objectives / What Student will be able to Do Upon Completing this Module |
Module 1 |
Introduction |
|
Module 2 |
Initial Onboarding & Configurations |
|
Module 3 |
Automated Fulfillment Express |
|
Module 4 |
Access Request Manager |
|
Module 5 |
Workflows |
|
Module 6 |
Rules |
|
Module 7 |
Roles & Business Role Manager |
|
Module 8 |
Web Services |
|
Access Training
for RSA Employees
If you need further assistance, contact us
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.