Course Outline
By the end of this training, participants will be able to:
Understand Modern Authorization for Distributed Systems
Distinguish between AuthZ and AuthN: key differences and common mistakes
Explore the evolution of the Identity & Access Management landscape
Address current challenges in authentication (AuthN)
Implement AuthN in distributed systems (cloud, microservices, edge)
Explore AuthZen & Policy-as-Code: the future of access control
Utilize PermGuard: authorization server, workspaces, and Git-like policy versioning
Master troubleshooting techniques
Summarize key learnings and plan next steps
Requirements
- Basic knowledge of security principles
- Fundamental programming skills
Audience
- Developers
- Software Architects
- Business Managers
- Security Architects
- Software Analysts
Testimonials (3)
The trainer's practical knowledge and his engaging anecdotes.
Mario Beckel - IABG mbH
Course - Identity and Access Management (IAM)
get to understand more about the product and some key differences between RHDS and open source OpenLDAP.
Jackie Xie - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
Defenitely the 90% HandsOn-Training and the Revisions of the Activities i had to do during the Training. The Traing was intense, due to i was the only member. But i learned a lot and Chris answered every single question i had. I would defenitly recommend this course.