Red Hat Security: Identity Management and Authentication (RH362) Training in South Africa

  • Learn via: Classroom / Virtual Classroom / Online
  • Duration: 4 Days
  • Level: Expert
  • Price: Please contact for booking options

Red Hat Security: Identity Management and Authentication (RH362) is an advanced security course that teaches how to configure and manage centralized identity services using Red Hat Enterprise Linux Identity Management (IdM).

This course focuses on coordinating authentication and authorization across Linux clients, network services, and Microsoft Active Directory environments.

We can organize this training at your preferred date and location. Contact Us!

Prerequisites

Candidates are recommended to:

  • Hold RHCE certification
    or

  • Demonstrate equivalent Linux system administration experience

Who Should Attend

  • Red Hat Certified System Engineers (RHCE)

  • Identity Management specialists

  • Access Management engineers

  • Administrators managing hybrid Linux and Windows environments

What You Will Learn

RH362 enables participants to:

  • Design scalable and resilient IdM topologies

  • Implement centralized user and access management

  • Integrate Kerberos, PKI, SSSD, and PAM

  • Manage TLS certificates

  • Configure two-factor authentication and Single Sign-On

  • Establish trust relationships with Active Directory

  • Plan disaster recovery and troubleshoot identity services


Business Impact

RH362 enables organizations to:

  • Centralize identity and access management

  • Enforce security policies consistently

  • Integrate Linux and Windows authentication systems

  • Optimize lifecycle management

  • Improve operational efficiency through Ansible and Satellite integration


Individual Impact

Participants who complete this course will be able to:

  • Design and manage IdM architectures

  • Configure Kerberos, PKI, and SSSD integrations

  • Implement Active Directory trust relationships

  • Enforce secure authentication policies

  • Develop disaster recovery strategies


Training Outline

Introduction to Identity Management

  • IdM architecture

  • High-level design concepts

IdM Core Technologies

  • SSSD

  • PAM

  • Kerberos

  • PKI

Installing Identity Management

  • Install IdM servers

  • Configure replicas

  • Register clients

  • Automate with Ansible Playbooks

Implementing IdM Topology

  • Single-site and multi-site deployment

  • High availability and resiliency

Managing Integrated CA and DNS

  • Certificate Authority management

  • DNS service integration

Managing Users and Access Control

  • User provisioning

  • Sudo policies

  • HBAC and RBAC configuration

Alternative Authentication Methods

  • Smart card authentication

  • Two-factor authentication

  • Secrets and vault management

Integrating with Active Directory

  • Cross-forest trust implementation

  • POSIX attribute mapping

  • ID view configuration

Integration with Red Hat Utilities

  • Red Hat Satellite integration

  • Red Hat Ansible Automation Platform integration

Troubleshooting and Disaster Recovery

  • Troubleshooting IdM issues

  • Backup and recovery planning

Comprehensive Review

  • Build a resilient IdM topology with replicas and clients

  • Configure policies and access controls



Contact us for more detail about our trainings and for all other enquiries!

Avaible Training Dates

Join our public courses in our South Africa facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

We can organize this training at your preferred date and location.
28 February 2026 (4 Days)
Cape Town, Durban, Johannesburg
13 April 2026 (4 Days)
Cape Town, Durban, Johannesburg
24 April 2026 (4 Days)
Cape Town, Durban, Johannesburg
19 May 2026 (4 Days)
Cape Town, Durban, Johannesburg
31 May 2026 (4 Days)
Cape Town, Durban, Johannesburg
10 June 2026 (4 Days)
Cape Town, Durban, Johannesburg
17 June 2026 (4 Days)
Cape Town, Durban, Johannesburg
01 July 2026 (4 Days)
Cape Town, Durban, Johannesburg
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.