Detailed Course Outline
- Identity Management in Red Hat Enterprise Linux
 - Introduce Identity Management in Red Hat Enterprise Linux (IdM) and its high-level architecture.
 - Identity Management Core Technologies
 - Review the core technologies of Identity Management (IdM) in Red Hat Enterprise Linux.
 - Installing Identity Management in Red Hat Enterprise Linux
 - Install Identity Management servers, replicas, and clients on Red Hat Enterprise Linux 9.
 - Implementing an Identity Management Topology
 - Implement continuous functionality and high availability of IdM services in single-site and geographically distributed topologies.
 - Managing the CA and DNS Integrated Services
 - Manage the Certificate Authority (CA) and the Domain Name System (DNS) services that are integrated with Identity Management.
 - Managing Users and Controlling User Access
 - Configure users for authorized access to services and resources.
 - Configuring Alternative Authentication Services
 - Configure and manage smart card authentication, secrets, and two-factor authentication.
 - Integrating Identity Management with Active Directory
 - Implement a cross-forest trust between Identity Management and Active Directory, and configure ID views to map POSIX attributes to Active Directory users.
 - Integrating Identity Management with Red Hat Utilities
 - Integrate an Identity Management deployment with Red Hat Satellite and Red Hat Ansible Automation Platform.
 - Troubleshooting and Disaster Recovery Planning for IdM
 - Troubleshooting and preparing for disaster recovery with Identity Management.
 - Comprehensive Review
 - Build a small, resilient Identity Management topology to include multiple replicas and clients, populated with multiple users, credentials, policies, and access rights.