From the course: Complete Guide to Identity and Access Management for Network Engineers
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Basic IAM configuration techniques
From the course: Complete Guide to Identity and Access Management for Network Engineers
Basic IAM configuration techniques
Hello and welcome to this module, Basic Identity and Access Configuration Techniques. In this video, we'll discuss the essential techniques for configuring Identity and Access Management systems focusing on Windows and Linux platforms. Firstly, we'll understand the initial setup process, which involves defining user roles and then creating identity repositories. After that, we'll move on to authentication configuration, where we'll talk about configuring password policies and multi-factor authentication. And then we'll focus on access control lists, role-based access control, we'll learn how to create and apply them, we'll also discuss user group management and its role within access control. And then lastly we'll touch on policy implementation and, of course, regular maintenance and conducting periodic reviews and audits. Now, it's important to get the setup right. There are a couple of core tasks. The first task is to establish identity repositories. This is choosing the platform…