Red Hat identity management (IdM) can play a central role in user authentication, authorization, and control. It can manage critical security components such as ssh keys, host-based access controls, and SELinux contexts. These functions are available in a standalone environment or when in a trust relationship with a Microsoft Active Domain Controller. In this lab, you'll learn the basic installation and configuration of IdM, configuration of an IdM replica, joining of clients to the IdM domain, basic user and host management activities, sudo setup, and ssh key management. You'll leave with an experience that can be repeated in your own environments to set up a rudimentary environment.