RSA SecurID Access I - Administration

This training course describes the functions and operations associated with managing endpoint and cloud application protection utilizing multi-factor authentication approaches. Hands-on exercises paired with practical use cases provide a rich educational experience to quickly gain expertise on the RSA.

Description

Overview

This course is designed to help accelerate the learning curve of individuals managing an RSA SecurID Access deployment.

Participants leave this training with the knowledge and experience of working with a variety of system management tasks and will explore: administrative structure, identity and user management, authenticator options and assignments, system policies, reporting capabilities, and common cases related to end-user problems and assistance.


Current RSA Authentication Manager customers who are planning to add cloud-based multi-factor authentication will benefit from the information and hands-on exercises in this course as well as learn about and work with the latest server and agent capabilities.

Extensive hands-on exercises performed in a virtual lab environment provide experience to reinforce important concepts and build practical skills.

 

Audience

System, security, or help desk administrators who need to administer and support the RSA SecurID Access product and users.

 

Learning Objectives

Upon successful completion of this training, participants should be able to:

  • Understand the basic architecture and theory of operation of the RSA SecurID Access system and components
  • Perform configurations required for general system operations and maintenance
  • Perform user administration functions to populate and manage users
  • Understand the setup and use of various authentication methods
  • Understand how users can leverage self-service functionality
  • Perform reporting and user troubleshooting

 

Course Outline

  • Product and Architecture Overview
    • System components
    • Product licensing
    • Component communication paths
  • User Management
    • Identity Sources and user accounts
    • User record operations and management tasks
  • Authentication Agents
    • Authentication Agent types
    • Agent record operations and management tasks
  • Authentication Methods
    • Authentication options and capabilities
    • Time synchronization and Emergency Access
  • Authenticator Management
    • Authenticator types
    • Authenticator assignment, distribution, and registration
    • Authenticator record operations and management tasks
    • RSA SecurID Access Authenticate app for mobile devices
  • Policies
    • RSA Authentication Manager system policies
    • Cloud Authentication access policies

 

  • Administrative Structure
    • Administrator hierarchy and roles
    • Administration consoles
    • Security Domains and user organization
  • Cloud Authentication Service Applications
    • Managing applications for the Application Portal
    • Managing application types and protocols
  •  Cloud Authentication Service Access Policies and rules
    • Configuring Access Polices for the Application Portal
    • Rule construction and options
  • RSA Authentication Manager User Self-service
    • Self-service and provisioning capabilities
    • Configuring and managing self-service options
  • RADIUS Administration
    • Managing RADIUS Clients and user profiles
  • Logs and Reports
    • Locating, reading, and archiving system and audit logs
    • Creating usage and activity reports
  • System Maintenance
    • Data backups – on-demand and scheduled
  • End-User Support
    • Identifying typical end-user problems
    • Using activity logs and reports for troubleshooting

 

 

 

Prerequisites

Students should have a fundamental conceptual understanding of network security and multi-factor authentication and familiarity with user administration in Microsoft® Windows® or other platform.

Students must provide their own iOS or Android device (smartphone or tablet) to complete exercises involving the RSA SecurID Access Authenticate mobile app.

Similar events

Key Features of this CISSP Training: - Earn CISSP certification — exam voucher included with course tuition fee - Official (ISC)2® course materials with a preferred (ISC)2® official partner - Access to hundreds of exam prep questions - After-course instructor coaching benefits included

More Information