RSA Access Manager Administration, Installation and Configuration

( Duration: 4 Days )

RSA Access Manager Administration, Installation and Configuration Training course offers theoretical and hands-on instruction in the administrative functions, operations, and installation and configuration tasks associated with the RSA Access Manager product. RSA Access Manager System architecture, server structure, integration of components into an enterprise infrastructure, user organization, and the importance of various configuration parameters are discussed.

By attending RSA Access Manager Administration, Installation and Configuration workshop, Participants will:

  • Explain the basic architecture and integration of RSA Access Manager in an enterprise environment
  • Describe the processes and methodology for performing a successful installation and implementation of the core servers, data adapter, Administrative Console and representative Agents
  • Describe the management functions used for resource and end user administration
  • Using a case study, perform typical administration functions to populate and configure users, administrators and groups in an RSA Access Manager database
  • Explain the configuration parameters that can be used to tailor the RSA Access Manager components to accomplish specific tasks and functions
  • Establish Entitlements and use RSA Access Manager Smart Rules to manage web access and protect resources in a classroom web environment
  • Perform system troubleshooting and analysis through the use of audit logs and user reports
  • Explore how runtime and administrative operations can be extended through the use of the API library

  • Familiarity with web and directory server or database technologies; A functional knowledge of OS and networking fundamentals.

System, security, or help desk personnel who need to install, deploy and/or maintain RSA Access Manager.



RSA Access Manager Overview

  • High level description of RSA Access Manager and its contribution to access management

RSA Access Manager Architecture

  • Description and functions of the Primary Servers; Web and Application Server Agents
  • Data Flow for the Runtime and Administrative operations
  • Description of how RSA Access Manager fits into a distributed security model

Installation and Configuration

  • Description of RSA Access Manager system requirements and pre – installation readiness tasks
  • Installation procedure, options, and recommended practices
  • Installation of Access Manager Servers, LDAP Data Adapter, Administrative Console, and Web and Application Server Agents
  • Configuration of Web Server for Single Sign-On

Managing Resources

  • Discussion of how resources (Web sites, Applications, etc.) are protected using RSA Access
  • Manager – focusing on selectivity and granularity in various situations
  • Registration of Web Servers and definition of Applications
  • Discussion of Virtual Web Server Hosts
  • Configuration of Web Server for virtual hosts


  • Discussion of the administrative structure that is possible in an RSA Access Manager installation
  • Use of Administrative Groups and ownership hierarchy of administrators, users, and objects
  • Examination of Administrative Roles and responsibilities

Managing the Organization

  • Policy control for user authentication and passwords
  • Methodology of structuring users, groups, user attributes, and properties
  • Creation of user properties and addition of users to groups

Resource Protection and Authentication

  • Discussion of Authentication Methods used to protect resources; Form – based vs. challenge/response authentication; Chaining and combining forms
  • Discussion of how resources are defined to allow granular protection
  • Use of RSA Access Manager Entitlements and Smart Rules to selectively manage access to resources
  • How to manage conflicts among Smart Rules and between Smart Rules and Entitlements
  • Configuration of Access Manager for external authentication and URL retention


  • Examination of the log files and use of special configuration parameters to control log detail
  • Configuration of servers for centralized logging
  • Configuration of Network Management
  • Discussion of approaches to user and system troubleshooting

Development Tools

  • Discussion of the various Runtime, Administrative, and Web Agent Extension API tools that are available
  • Examination and implementation of JAVA coding examples

Single Sign-On

  • Discussion of the function and objectives of creating a single sign-on environment
  • Explanation of the differences and challenges of ‘Intra-‘ vs. ‘Inter-‘ site single sign-on
  • Configuration of Access Manager for SSO and ISSO

Distributed Authorization

  • Discussion of achieving redundant functionality and failover
  • Explanation of the differences in Standard Mode vs. Distributed Mode failover
  • Test of centralized logging

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 4,000 Modules on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting http://encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop for a group of 10+ candidates at our venue