Chapter 1: Intro to Identity & Access Management
- Explaining what is Identity & Access Management & its need in digital world
- Explaining AM’s architecture
- Uses in Access Management domain
Chapter 2: Performing Basic Installation/ Configuration
- Understanding & working with Default Authentication
- Protecting a Web resource
- Users Self-Service
Chapter 3: Intelligent Authentication
- Extending Authentication Functionality
- Retrieving User Information
- Increasing Authentication Security
Chapter 4: Controlling Access Using Authorization
- Controlling Access
- Extending Entitlements
Chapter 5: Extending Services Using OAuth 2.0-Based protocols
- Configuring OAuth 2.0 (OAuth2) Server
- Configure OpenID Connect 1.0 (OIDC)
- Sharing Resources with UMA 2.0 (UMA2)
- Implementing Social Authentication
Chapter 6: Preparing for Production
- Customizing AM End User Pages
- Hardening AM Security
- Administering an AM Solution
- Installing and Upgrading AM
- Clustering AM
Chapter 7: Amster
- Amster installation
- Amster connection with SSH SSL KEY
- Installing AM with Amster
- Amster scripting for AM configuration export/import
Chapter 8: Federating Across Entities Using SAML v.2 (SAML2)
- Implementing Single Sign-On Using SAML2
- Delegating Authentication Using SAML2
Chapter 9: Logging and Troubleshooting
- Log Files
- Managing Logs
- Troubleshooting Authentication and Authorization issues