This Video ILT course provides an overview of the administrative responsibilities associated with an RSA SecurID® system.
The working principles behind RSA Authentication Manager and RSA SecurID authenticators are discussed, including product architecture, time synchronization, managing external Identity Sources and exploring all aspects of an administrative structure.
The subject matter in this course helps prepare students with the classroom component recommended for the RSA Authentication Manager Certified Administrator certification.
This course is delivered in a streaming video format that includes recorded instructor lectures as well as comprehensive demonstrations of all lab exercises.
System, security, or help desk administrators who need to administer and support RSA SecurID products.
6 hours (streaming)
Familiarity with Microsoft® Windows® or UNIX/Linux system administration.
Upon successful completion of this course, participants should be able to:
Understand the basic architecture and theory of operation of the RSA SecurID product suite
Perform configurations required for RSA Authentication Manager system operations
Perform user administration functions to populate and manage users
Perform reporting and user troubleshooting
Understand ongoing maintenance requirements
Understand the setup and use of software authenticators
Understand the configuration and use of self-service functionality
Product and Technology Overview
High level description of RSA Authentication Manager and its contribution to user authentication
Authentication as a foundation of security, trust and confidence in digital identities
RSA Authentication Manager system components and communication
RSA SecurID Authentication
RSA SecurID authentication options
Concepts of strong user authentication
Token technology – time synchronization, authenticator types
Configuration and management of risk-based authentication
Device fingerprinting and behavior data collection and analysis
Selecting assurance levels
Deployment and Administrative Structure
Deployment planning and establishing an administrative structure
Defining and applying policies to the system and Security Domains
Password and Token policies
Lockout and self-service policies
Risk-based and Offline authentication policies
Establishing and maintaining organizational and administrative structures:
LDAP Identity Sources
User and User Group structures
Administrative roles and delegation
Managing RSA SecurID hardware tokens
Software token deployment and installation
Managing Risk-Based Authentication
Managing On-Demand Authentication
Auditing, Reports and Troubleshooting
RSA Authentication Manager report functions
Self-Service Management and Support
Configurations for user self-service functions
User account and authenticator management and provisioning