Duration 4 days – 28 hrs
Overview.
The Red Hat Single Sign-On Administration (DO313) course provides IT professionals with the knowledge and skills required to deploy, configure, manage, and secure Red Hat Single Sign-On (SSO) for user authentication across enterprise applications. This course focuses on implementing centralized authentication solutions, streamlining the login experience, and securing access to applications and services through integration with identity providers, such as LDAP, Active Directory, and social login services. Participants will learn to configure protocols such as OAuth, OpenID Connect, and SAML, and implement secure authentication policies to meet enterprise security requirements.
Objectives
- Deploy Red Hat SSO in a production environment.
- Configure SSO instances and realms.
- Create and manage users and groups.
- Configure authentication mechanisms such as LDAP, Kerberos, and social logins.
- Integrate SSO with client applications.
- Configure client authentication protocols like OAuth, OpenID Connect, and SAML.
- Set up SSO for multiple applications and services across domains.
- Configure session management and configure user federation.
- Monitor the health and performance of Red Hat SSO.
- Troubleshoot common issues and configure logging and auditing.
- Implement security best practices for Red Hat SSO deployment.
- Use multi-factor authentication (MFA) and configure encryption settings.
Audience
- System Administrators: Administrators who are responsible for managing authentication, user access, and security policies in an enterprise environment.
- Identity and Access Management (IAM) Professionals: Professionals tasked with configuring and managing centralized identity and access systems to ensure secure and seamless user authentication.
- DevOps Engineers: Engineers responsible for integrating Red Hat Single Sign-On into DevOps pipelines and applications, ensuring a secure and unified user authentication experience.
- Security Administrators: Security-focused IT professionals who need to configure Red Hat SSO for enhanced security protocols, including multi-factor authentication, encryption, and centralized access control.
- Application Administrators: Administrators who oversee the deployment of applications that need to be integrated with Red Hat SSO for user authentication and authorization.
- Technical Architects: Professionals involved in designing and implementing secure, scalable, and high-availability authentication solutions using Red Hat SSO across complex environments.
Pre- requisites
- Basic Linux system administration skills.
- Familiarity with web protocols (HTTP/HTTPS).
- Understanding of identity and access management (IAM) concepts.
- Basic networking knowledge (IP, DNS, firewalls).
- Experience with writing web-based applications using Node.js, HTML5, Quarkus, or Java Basic Linux system administration skills.
Course Content
Introduce Red Hat Single Sign-On
- Identify the main components of Red Hat Single Sign-On
Install and Configure Red Hat Single Sign-On
- Identify the best option for installing and configuring RHSSO depending on the infrastructure
Authentication and Authorization
- Configure authentication and authorization for applications
Identity Brokering and User Federation
- Configure RHSSO to secure applications from multiple identity providers by using user federation and social logins
Red Hat Single Sign-On on OpenShift
- Install and configure Red Hat Single Sign-On on OpenShift