IBM Security Identity Manager 6.0 Basic Administration

COURSE OUTLINE:

Description

This course teaches basic administration of IBM Security Identity Manager 6.0. In this course, you learn concepts and you configure an IBM Security Identity Manager deployment on Linux. Lecture topics include planning, installation, configuration, reporting, and problem determination. The course also includes many hands-on exercises to supplement the lecture.

Audience

This basic course covers basic information about IBM Security Identity Manager 6. It is suitable for system administrators and implementers who deploy and manage IBM Security Identity Manager in an organization.

Learning Objectives

  • Describe the value proposition of IBM Security Identity Manager 6.0
  • Describe the process of creating a needs assessment document for Security Identity Manager
  • Identify the major components of the IBM Security Identity Manager 6.0 system architecture
  • Describe the installation process for IBM Security Identity Manager 6.0 and middleware
  • Configure organizational units, locations, and administrative domains
  • Navigate LDAP directory data
  • Create static and dynamic organizational roles
  • Create identity feeds for the five feed types
  • Manually request, modify, suspend, restore, and delete accounts
  • Create services and configure reconciliation
  • Create identity, password, service selection, provisioning, and recertification policies
  • Describe workflow elements and create workflows
  • Describe notifications and use the Notification Post Office
  • Create groups, views, and access control items
  • Create and manage account and access entitlements
  • Modify join directives
  • Correct noncompliant accounts and adopt orphaned accounts
  • Manage account and access request activities
  • Configure life cycle management
  • Customize account and other entity forms
  • Configure service forms, password settings, and synchronization
  • Customize the administrative and self-service consoles
  • Generate reports and design custom reports
  • Audit request activities
  • Describe methods of problem determination