No
Yes
View More
View Less
Working...
Close
OK
Cancel
Confirm
System Message
Delete
Schedule
An unknown error has occurred and your request could not be completed. Please contact support.
Scheduled
Wait Listed
Personal Calendar
Speaking
Conference Event
Meeting
Interest
There aren't any available sessions at this time.
Conflict Found
This session is already scheduled at another time. Would you like to...
Loading...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session summary
We were unable to load the map image.
This has not yet been assigned to a map.
Search Catalog
Reply
Replies ()
Search
New Post
Microblog
Microblog Thread
Post Reply
Post
Your session timed out.
This web page is not optimized for viewing on a mobile device. Visit this site in a desktop browser to access the full set of features.
Red Hat Summit 2017

L103188 - Up and running with Red Hat identity management

Session Speakers
Session description

Red Hat identity management (IdM) can play a central role in user authentication, authorization, and control. It can manage critical security components such as ssh keys, host-based access controls, and SELinux contexts. These functions are available in a standalone environment or when in a trust relationship with a Microsoft Active Domain Controller. In this lab, you'll learn the basic installation and configuration of IdM, configuration of an IdM replica, joining of clients to the IdM domain, basic user and host management activities, sudo setup, and ssh key management. You'll leave with an experience that can be repeated in your own environments to set up a rudimentary environment.


Additional information
Infrastructure, Management, Security
Instructor-led lab
2 hours
Session schedule