Course Overview
Red Hat Single Sign-On Administration (DO313) is designed for system administrators who want to install, configure and manage Red Hat Single Sign-On servers for securing applications. Learn about the different ways to authenticate and authorize applications using single sign-on standards like OAuth and OpenID Connect (OIDC). You will also learn how to install and configure Red Hat Single Sign-On on the OpenShift Container Platform. This course is based on Red Hat Single Sign-On version 7.6.
Course Objectives
- Installing Red Hat Single Sign-On on virtual machines and on OpenShift Container Platform Authenticating and authorizing applications using OAuth and OIDC
- Configuring Identity Brokering and user identity federation from external systems
- Configuring password policies
Who Should Attend?
System Administrators responsible for administering Red Hat Single Sign-On servers.
- Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
- Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
- Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
- Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
- Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
- Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.
Agenda
1 - Introduce Red Hat Single Sign-On
- Identify the main components of Red Hat Single Sign-On
2 - Install and Configure Red Hat Single Sign-On
- Identify the best option for installing and configuring RHSSO depending on the infrastructure
3 - Authentication and Authorization
- Configure authentication and authorization for applications
4 - Identity Brokering and User Federation
- Configure RHSSO to secure applications from multiple identity providers by using user federation and social logins
5 - Red Hat Single Sign-On on OpenShift
- Install and configure Red Hat Single Sign-On on OpenShift