Sun Java System Access Manager Config and Customization - Self-Study Course
The Sun Java System Access Manager: Configuration and Customization course provides students with a description of the role of the Sun Java System Access Manager (Access Manager) in an identity management solution. Students learn to configure, manage, administer, and customize Access Manager services, authentication, authorization, and federated identity. This comprehensive course covers a number of identity management concepts and Access Manager functions that range in complexity from introductory to advanced.
Students that can benefit from this course:- System engineers, professional services consultants, application developers, architects, and other technical personnel
- Students implementi…
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
The Sun Java System Access Manager: Configuration and Customization course provides students with a description of the role of the Sun Java System Access Manager (Access Manager) in an identity management solution. Students learn to configure, manage, administer, and customize Access Manager services, authentication, authorization, and federated identity. This comprehensive course covers a number of identity management concepts and Access Manager functions that range in complexity from introductory to advanced.
Students that can benefit from this course:- System engineers, professional services consultants, application developers, architects, and other technical personnel
- Students implementing Access Manager in an existing infrastructure and adapting the products appearance and functionality to suit the specific enterprise requirements
Audience
- Application Developers
- Architect
- Technical Consultant
Course Topics Sun Java System Access Manager
- Describe identity management
- Describe network identity implementation
- Describe the Sun Java System identity management framework
- Identify Access Manager components
- Describe Policy Agent software
- Examine a case study
- Identify deployment components
- List basic deployment scenarios
- Start and stop Access Manager and Policy Agent instances
- Describe Access Manager configuration
- Configure Policy Agent instances
- Configure secure sockets layer (SSL) with the Access Manager
- Describe the types of data the Access Manager uses
- Describe Access Manager realms
- Describe realm and legacy modes
- Describe identity repository types
- Configure identity repositories
- Describe Access Manager management tools
- Create and configure realms
- Delegate administration
- Describe Access Manager services
- Configure Access Manager services using the console
- Configure Access Manager services using the command-line interface (CLI)
- Describe service configuration for new realms
- Describe the Access Manager Logging Service
- Describe debug files
- Describe Policy Agent logging
- Describe Access Manager authentication
- Describe the Access Manager authentication architecture
- Describe the mechanism for non-programmatic and programmatic authentication
- Configure Access Manager authentication
- Describe the authentication process
- Describe Access Manager sessions
- Describe SSO
- Constrain user sessions
- Describe the Access Manager authentication interface and its architecture
- Configure a customized authentication interface
- Describe authentication interface JSP templates
- Customize an authentication interface
- Describe policy
- Describe the policy architecture
- Describe policy components
- Describe policy storage
- Administer policy
- Configure policies using the console
- Describe policy evaluation principles
- Examine a policy evaluation example
- Describe policy interoperability
- Describe SAML
- Describe SSO system flow using SAML
- Configure SAML support on the Access Manager
- Describe the Liberty Alliance project
- Describe the Liberty specification
- Identify Liberty web services
- Describe the identity federation process and user experience
- Describe Liberty process flow
- Describe cross-domain single sign-on (CDSSO)
- Describe and configure distributed authentication
- Run Access Manager from a user account other than the root account
- Describe and configure high availability
- Describe and configure persistent searches
- Describe and configure session caching options
Course Objectives
- Define the role of the Access Manager and list the features and functions of the Access Manager that address key business challenges
- Configure the Access Manager and Policy Agents
- Configure and customize authentication and single sign-on (SSO)
- Configure, administer, personalize, and customize authorization
- Describe the Security Assertions Markup Language (SAML) and federated identity, and their implementation in Access Manager
- Implement advanced deployment scenarios, including cross-domain single sign-on (CDSSO) and high availability
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
