Rating 4.45 out of 5 (55 ratings in Udemy)
What you'll learn- Understanding Java Agent
- configuring java agent Profile
- Protecting application on App server
- Understanding Modules
- Various authentication modules and features
- Understanding Chain
- Implement MFA[Multi Factor Authentication] using chain
- Authentication node
- Advanced Authentication Tress
- Looping one tree within tree
- Implementing MFA using Tree
- Adaptive MFA
- Adaptive Risk Module
- REST API end point for Access Manager
- Cyber …
Rating 4.45 out of 5 (55 ratings in Udemy)
What you'll learn- Understanding Java Agent
- configuring java agent Profile
- Protecting application on App server
- Understanding Modules
- Various authentication modules and features
- Understanding Chain
- Implement MFA[Multi Factor Authentication] using chain
- Authentication node
- Advanced Authentication Tress
- Looping one tree within tree
- Implementing MFA using Tree
- Adaptive MFA
- Adaptive Risk Module
- REST API end point for Access Manager
- Cyber Security
DescriptionIdentity and Access management is an important part of cyber security.
This is the 2nd part of the course, and mainly designed for them who had successfully implemented the first part and made there basics string from there.
Here the complete focus will be learning advanced features of Access Manager like Web Protection, MFA, REST APIs, Access Controls, Authorization etc.
The training program assumes that candidate have all prerequisite already setup to learn this part , as discussed in previous part of the course.
Also please go through per session until you are not clear with the implementations before proceeding further.
Wish you all the best.
Topic Covered:
Introduction
Protecting Application on J2EE Server
Understanding Use Case and Application Server
MVC Architecture
Application Server Configuration
Java Agent and Architecture
Java Agent Configuration, testing the protection & cookie analysis
Modules and Chain in Access Management
Introduction to Modules and Chain
various Module Criteria and Flags
Authentication Level and it's role in AM
Various Authentication Modules
MFA(Multi factor Authentication) using Chain [with use case]
Implementing MFA using chain
Adaptive or Smart or Extended MFA with modules and chain use case
Adaptive MFA with modules and chain
Authentication Tree
Introduction to Tree
Types of Nodes
Creating simple login tree
Tree to lock user anonymous login
Implementing MFA using Tree
Adaptive or Extended MFA using Tree
OpenAM REST API For Authentication
Introduction to REST API and Postman
OpenAM REST API Practical
Rest API Problem and Solution