Skip to end of banner
Go to start of banner

Trng Outline

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

Day 1

EmpowerID Critical Concepts

  • Core Identity/Person/Account

  • Authentication

  • Security/RBAC

  • Platform Architecture

  • External Systems/Account Stores

EmpowerID System Architecture

  • EmpowerID Platform Architecture Overview

  • EmpowerID Servers

  • EmpowerID Database

  • Server Roles

  • Jobs and Services

  • Permanent Workflows

Using the EmpowerID Web User Interface

  • Logging into EmpowerID

  • Persona Switching

  • Navigating the Web UI

  • Dashboard

 Managing IT Resources in EmpowerID

  • ViewOne page

  • EditOne page

  • Person

  • Account

  • Group

Day 2

Connecting to External Systems

  • Connector overview - OOB versus Custom Connectors

  • Account Stores and Resource Systems Overview

  • Connecting to AD

  • Creating a Universal Flat File connector

Identity Lifecycle Processing

  • Account inbox processing

  • External Roles and Locations

  • Dynamic Hierarchy for Roles/Locations

  • Role and Location Mapping

  • Provisioning Policies (RET)

  • Attribute Flow Rules

  • Default Attribute Policies

  • Joiner Processing

  • Mover Processing

  • Leaver Processing

Day 3 and 4

EmpowerID Security Model

  • Traditional RBAC versus EmpowerID RBAC Model

  • RBAC/TRBAC Overview

  • Security Components (management roles, Access Levels, Operations)

  • Creating and using Query Based Collections

  • Configuring Access Management in EmpowerID (RBAC Pyramid)

  • Approval Flow Policies

  • Access Request Policies

 Visibility Filtering

  • Visibility Restriction Policies

  • Data Filters

 Practical RBAC Configuration

  • RBAC Assignment/Scope Types – BRL, Group, QBC, MR, Location

  • Creating/Managing Management roles and assignments

  • RBAC Strategy, Building a coherent RBAC architecture

  • EmpowerID Business Roles and Locations

  • When to use Business Roles versus Management roles

  • Practical Persona Example

 Password Management

  • Password Policies

  • Password Self Service workflows and processes

Day 5

Self-Service / IT Shop

  • IT Shop Overview

  • Requesting Resources

  • My Resources

  • Managing Resources through IT Shop

 Birthright Access Configuration

  • Process Flow

  • Provisioning Policies – Account provisioning

  • Role/Location assignments

  • Management Role assignments

  • Group access Assignments

  • Dynamic Hierarchy for groups and management roles

  • Processing jobs

 Miscellaneous system configuration

  • Localized text, emails, and email configuration

  • Workflow Parameters

  • Noun Verb UI Actions

  • Global system settings

  • Audit Logs and Troubleshooting

  • No labels