This training course describes the functions and operations associated with managing endpoint and cloud application protection utilizing multi-factor authentication approaches.Hands-on exercises paired with practical use cases provide a rich educational experience to quickly gain expertise on the RSA
This course is designed to help accelerate the learning curve of individuals managing an RSA SecurID Access deployment.
Participants leave this training with the knowledge and experience of working with a variety of system management tasks and will explore: administrative structure, identity and user management, authenticator options and assignments, system policies, reporting capabilities, and common cases related to end user problems and assistance.
Current RSA Authentication Manager customers who are planning to add cloud-based multi-factor authentication will benefit from the information and hands-on exercises in this course as well as learn about and work with the latest server and agent capabilities.
Extensive hands-on exercises performed in a virtual lab environment provide experience to reinforce important concepts and build practical skills.
System, security, or help desk administrators who need to administer and support the RSA SecurID Access product and users.
Delivery Type Classroom
Duration 4 days
Students should have a fundamental conceptual understanding of network security and multi-factor authentication and familiarity with user administration in Microsoft® Windows® or other platform.Students must provide their own iOS or Android device (smartphone or tablet) to complete exercises involving the RSA SecurID Access Authenticate mobile app.
Upon successful completion of this training, participants should be able to:
Understand the basic architecture and theory of operation of the RSA SecurID Access system and components
Perform configurations required for general system operations and maintenance
Perform user administration functions to populate and manage users
Understand the setup and use of various authentication methods
Understand how users can leverage self-service functionality
Perform reporting and user troubleshooting
Product and Architecture Overview
Component communication paths
Identity Sources and user accounts
User record operations and management tasks
Authentication Agent types
Agent record operations and management tasks
Authentication options and capabilities
Time synchronization and Emergency Access
Authenticator assignment, distribution, and registration
Authenticator record operations and management tasks
RSA SecurID Access Authenticate app for mobile devices
RSA Authentication Manager system policies
Cloud Authentication access policies
Administrator hierarchy and roles
Security Domains and user organization
Cloud Authentication Service Applications
Managing applications for the Application Portal
Managing application types and protocols
Cloud Authentication Service Access Policies and rules
Configuring Access Polices for the Application Portal
Rule construction and options
RSA Authentication Manager User Self-service
Self-service and provisioning capabilities
Configuring and managing self-service options
Managing RADIUS Clients and user profiles
Logs and Reports
Locating, reading, and archiving system and audit logs
Creating usage and activity reports
Data backups – on-demand and scheduled
End User Support
Identifying typical end user problems
Using activity logs and reports for troubleshooting