WhatsApp : +918121020333 / +919849510373

India: +91 40 6050 1418

USA: +1 516 8586 242

UK: +44 (0)203 371 0077

Hitachi ID Privileged Access Manager Training

Introduction To Hitachi ID Privileged Access Manager Training:

Hitachi ID Privileged Access Manager is an system for securing access to elevated privileges. It works by regularly randomizing privileged passwords on  the Personal computers, servers, network devices &  applications. The random passwords are encrypted & are stored in two or more replicated credential vaults. The access to privileged accounts may be disclosed: To the people after suitable identification, authentication & the authorization. And to applications, by replacing embedded passwords.  The Windows systems  which need them to start the services. The password changes &   access disclosure are closely controlled & audited, to meet the policy & regulatory requirements. register for  Hitachi ID Privileged Access Manager Training for more details about the course.

Hitachi ID Privileged Access Manager online training course content

Introduction
  • Install software
  • Install the replica
Targets & auto-discovery
  • AD target (source of profiles)
  • Configure the system to omit disabled accounts & “manage” all AD groups
  • Run & troubleshoot psupdate
  • The Log viewer
Manual targets and intro to policies
  • Configure a manual WinNT& Linux target
  • Configure a simple MSP for these two targets
  • User Class for a few users
  • MSP to the User Class to get ACLs
  • Run the psupdate to get passwords randomized
  • Show logs & reports
Basic user experience
  • Sign UI with AD creds
  • Checkout launch RDP & SSH to one system
  • Run reports
Infrastructure auto-discovery and import rules
  • Bunch of fake computers on AD
  • Simulator for WinNT targets
  • Run through & troubleshoot discovery/import/management
Introduce the pull mode
  • Motivation
  • Configure & deploy MSI to a WinXP and a Win7 client
Workflow for one-off requests
  • Discuss scenarios
  • Request attributes & attribute validation
  • Selecting authorizers
  • Consensus &  veto power
  • Automatic reminder e-mails
  • Early escalation
  • Reports & dashboards
  • The roles of workflow & delegation managers
Workflow for one-off requests
  • Discuss scenarios
  • Request attributes & attribute validation
  • Selecting authorizers
  • Consensus &  veto power
  • Automatic reminder e-mails
  • Early escalation
  • Reports & dashboards
  • The roles of workflow & delegation managers
Service accounts on Windows
  • Intro to the Windows security model
  • Cases where service accounts are already managed by Windows
  • Server-local accounts
  • Domain-level accounts & special challenges due to Microsoft “best practices”
  • Reports to find service accounts
Embedded accounts & passwords
  • Intro to the problem
  • Alternative solution approaches
  • Security catch
  • Introduce the HiPAM API:
  • Need for an API wrapper