You are on page 1of 2

C l 8 --iK O o e i a 8 84BT O r ma l l Ta i @b k oc m t rc v a rin n g io .

t o o ei e e f eq oeo D - l r u t n BWa e l s c s mi dTa i C us u t z rn g o re o e n

Course Agenda
Section 1 Problem Domain -What is authorization management? -Articulate the authorization management challenge -Application security concepts -How Keystone Authorization Management works -Understand and describe the benefits of Keystone Section 2 Architecture -Keystone architecture -Architecting for high availability and performance -Environment appropriate architecture

KEYSTONE Keystone has become known as the best of breed finegrained authorization management solution. It provides a consistent approach for authorization management, and is implemented as set of web services, callable across the network to automate the granting of user access to enterprise information. Keystone controls access across all classes of users (employees, partners, customers, and contractors) and all systems for which access must be managed (Web, client-server, mainframe, off the shelf and custom-built).

Section 3 Installation, Functionality -Hardware considerations -Ability to install and configure Keystone -Identify Keystone features and functions related to the installation and configuration steps Section 4 Integration -Application integration options -Application filters -Integration with 3rd party IAM tools -How to achieve single sign on -Directory abstraction layer configuration and extensibility Section 5 Security Policy -Security policy concepts (from coarse to fine grained) -How to leverage user attributes -Role definitions -Role to policy mapping -Policy modeling -Policy life cycle considerations -Keystone expressions -Dynamic assignments -SOD rules

Section 6 Administration -Delegated administration concepts -Keystone protecting Keystone -Admin roles Section 7 Audit and Reporting -Audit trail database -Complete understanding of Keystone logging and reporting capabilities -Ability to leverage 3rd party reporting tools -Review of client specific reporting requirements and Keystone alignment Section 8 Best Practices -Best practices guidelines and overview -Prioritizing applications for Keystone integration -Building the project team -Filling gaps with services -Customer specific questions/answers

For more information on any of our products or services please visit us on the Web at: www.bitkoo.com or Call us at 888-4-BiTKOO International: +1-818-985-4700

You might also like