Select Page

PingAccess Training | PingAccess Certification

PingAccess Training | PingAccess Certification

⏰24 hours | ▶️ 24 Videos | 📣 7829 Participants | 🎓 3694 Reviews | 4.8 ⭐⭐⭐⭐⭐

Choose a Plan that Works for You

Upcoming Batches PST

 Weekday 

July 14(1 HR A DAY)
06:00 PM PST
Enroll Now  →

 Weekday 

July 30(1 HR A DAY)
06:00 AM PST
Enroll Now  →

 Weekend

July 26(1 HR A DAY)
06:00 PM PST
Enroll Now  →

Upcoming Batches IST

 Weekday 

July 15(1 HR A DAY)
07:30 AM IST
Enroll Now  →

 Weekday 

July 30(1 HR A DAY)
07:30 PM IST
Enroll Now  →

 Weekend 

July 27(1 HR A DAY)
07:30 AM IST
Enroll Now  →

Course Description

PingAccess Training Course, developed for IT professionals, security architects, and developers looking to hone their understanding of access control for online apps and APIs, has proven indispensable as organisations increasingly rely on safe digital experiences; understanding effective access controls has become paramount.

This PingAccess course delves deep into PingAccess, an advanced system for centralised access control that also improves application security. Participants will learn its principles and design before exploring its position within the larger Ping Identity ecosystem.

This PingAccess course covers major security aspects including policy-based access control, resource protection and PingAccess interaction with other identity systems , providing students with the tools needed to create a comprehensive security strategy.

At each session, participants will engage in hands-on experiments designed to give them practical expertise with PingAccess’ user interface and API. Not only will this approach reinforce theoretical knowledge but it will equip learners with skills needed for efficiently deploying and maintaining PingAccess in real world situations.

Learners will gain an in-depth experience installing PingAccess, exploring different deployment choices and configuration options tailored specifically for their organization’s security requirements. In addition, participants will engage in developing and monitoring access policies designed specifically for their applications , providing participants with all of the processes required for strong protection measures tailored specifically for them.

PingAccess Online Training will go beyond configuration and policy administration to also cover troubleshooting and performance optimisation measures. Recognizing common faults and optimizing PingAccess performance are integral parts of maintaining an efficient environment, learner’s will also get to explore best practices for expanding access management solutions while adhering to industry standards.

This course is tailored towards system administrators, security professionals and developers with basic understanding of identity and access management principles and PingAccess, thus making this accessible for individuals looking to extend their skill set.

By the end of this course, participants will have gained enough skills and knowledge to effectively deploy and administer PingAccess in their apps, protecting against unauthorised access while offering a positive user experience. Whether looking to enhance your organization’s security posture or expand their career options in identity management , taking this PingAccess training course represents an outstanding investment in professional growth!

Not only will you discover its intricate workings, but you will also meet an empowering community dedicated to mastering access management solutions. By attending, this PingAccess course will equip you with all of the knowledge and abilities required for effective PingAccess usage that contribute to the security and success of any organization in today’s increasingly complex digital sphere.

Features

✅Lifetime access ✅Lifetime video access
✅Real-time case studies ✅The project integrated into the Curriculum
✅24*7 Support from our team of administrators

Course Content

Overview

PingAccess Components

Deployment Models

Ping Access Agents

Ping Access Agents High Level Flow

Log and Configuration File Location

Virtual Hosts

Web Sessions

Identity Mapping

Token Mediation

Sites

Applications

Installation of PingAccess agent

Session Management

Administration API

SSL, Certificates and Trust Stores

Monitoring and Backup

Clustering

FAQ’s

(more…)

PingFederate Training – PingFederate Certification Training

PingFederate Training – PingFederate Certification Training

⏰15 hours | ▶️ 15 Videos | 📣 4902 Participants | 🎓 2350 Reviews | 4.7 ⭐⭐⭐⭐⭐

Choose a Plan that Works for You

Upcoming Batches PST

 Weekday 

July 09(1 HR A DAY)
07:30 AM IST
Enroll Now  →

 Weekday 

July 30(1 HR A DAY)
06:00 AM PST
Enroll Now  →

 Weekday 

July 27(1 HR A DAY)
06:00 AM PST
Enroll Now  →

Upcoming Batches IST

 Weekday 

July 10(1 HR A DAY)
07:30 PM IST
Enroll Now  →

 Weekday 

July 30(1 HR A DAY)
07:30 PM IST
Enroll Now  →

 Weekday 

July 27(1 HR A DAY)
06:00 PM PST
Enroll Now  →

PingFederate Course Description:

In order to provide effective training, we’ve designed our PingFederate Training course to thoroughly cover essential concepts and provide students with plenty of hands-on practise applying what they’ve learned. Such exposure to the current industry use-cases and situations will enable trainees scale up their skills and do real-time projects with the best practises.

With the help of our PingFederate Certification training, you may pass the Ping Identity Certified Professional – PingFederate Exam.

Topics covered in PingFederate training include Identity and Access Management (IAM), Security Token and Multi-Factor Authentication (MFA), Logging, and PingFederate Cluster.

PingFederate is the industry standard when it comes to enterprise federation servers, which allows businesses to benefit from secure user authentication and a unified sign-on experience. The PingFederate server is simple to administer and integrate. This server solution is a key factor in the development of more sophisticated approaches to user single sign-on. Users, employees, and customers all benefit from PingFederate because of the ease, safety, and continuity it provides.

With our PingFederate training, you’ll be able to quickly pick up the fundamentals of this server management framework and use them proficiently across a wide range of environments. It is an enterprise grade identity federation server for the organizations of varied scales. Experts in their fields, we are fully dedicated to providing current course materials.

Features

✅Lifetime access ✅Lifetime video access
✅Real-time case studies ✅The project integrated into the Curriculum
✅24*7 Support from our team of administrators

Course Content

1.Installation of PF on windows

2.Concepts of SAML

3.Concepts of Oauth,Oidc.

4.Creation of dataastore,pcv,adapter,saml connection.

5.Working configuration for saml,oidc,oauth.

6.Use of postman and oauthplayground

7.Overview of customisation in PingFederate

8.Working with OGNL expression

9.PingFederate authentication policies and selectors

10.Certificate management

11.Logs study Clustering in PingFederate

12.Installation of pongged on docker

FAQ’s

(more…)

Forgerock Training The only IAM Course you need

Forgerock Training The only IAM Course you need

⏰24 hours | ▶️ 24 Videos | 📣 10946 Participants | 🎓 5520 Reviews | 4.9 ⭐⭐⭐⭐⭐

Choose a Plan that Works for You

Upcoming Batches PST

 Weekday 

July 09(1 HR A DAY)
06:00 PM PST
Enroll Now  →

 Weekday 

July 30(1 HR A DAY)
06:00 AM PST
Enroll Now  →

 Weekend

July 26(1 HR A DAY)
06:00 PM PST
Enroll Now  →

Upcoming Batches IST

 Weekday 

July 10(1 HR A DAY)
07:30 AM IST
Enroll Now  →

 Weekday 

July 30(1 HR A DAY)
07:30 PM IST
Enroll Now  →

 Weekend 

July 27(1 HR A DAY)
07:30 AM IST
Enroll Now  →

Course Description

So you want to learn Forgerock Training? Great job!

Do you know Forgerock  Training  is the most trending Analytics course?

There are massive opportunities in Forgerock Training as it leads the Analytics market.

Our Forgerock Training course is a job oriented course ie at the end of the course you can
easily clear interviews or on board into an ongoing Forgerock Training project.

Also the salaries in Forgerock Training is very impressive (Indeed.com report)

Features

✅Lifetime access ✅Lifetime video access
✅Real-time case studies ✅The project integrated into the Curriculum
✅24*7 Support from our team of administrators

Course Content

1.Introducing AM Core Concepts

Introduce access management
 Provide a great user experience
 Demonstrate SSO between FEC website and AM

2.Protecting an Application with Intelligent Authentication

 Introduce intelligent authentication
 Describe authentication mechanisms
 Describe available nodes
 Describe multi-factor authentication
 Demonstrate various authentication methods

3.Controlling Access to an Application with AM Authorization

 Introduce authorization
 Describe authorization mechanisms
 Demonstrate how access can be restricted to a specific group of users

4.Protecting REST APIs and Integrating Mobile Applications with OAuth2-Based Protocols

Introduce AM roles in the OAuth2 and OpenID Connect (OIDC) contexts
 Protect a REST API
 Integrate a mobile application
 Demonstrate how REST clients obtain and use access and ID tokens

5: Improving Security with a Zero Trust Approach

 Introduce zero trust approach to security
 Calculate risk with contextual adaptive intelligent authentication
 Demonstrate the use of device nodes
 Check risk level continuously
 Improve user experience without impacting security with WebAuthN
 Demonstrate usernameless authentication with WebAuthn

6: Integrating with Third-Party SAML2 Entities

 Introduce SAML2 standard
 Use AM as a SAML2 entity
 Demonstrate SSO between federated SAML2 entities

BENEFITS

 Describe AM core concepts
 Explain how to protect an application with intelligent authentication
 Understand how to control access with AM authorization
 Understand the role of AM when using OAuth2-based protocols to protect REST APIs
 Understand the role of AM when using OAuth2-based protocols to integrate mobile
applications
 Describe how AM implements a zero trust app

FAQ’s

(more…)

Okta Training – The only IAM Course you need

Okta Training – The only IAM Course you need

⏰24 hours | ▶️ 24 Videos | 📣 9348 Participants | 🎓 4855 Reviews | 4.9 ⭐⭐⭐⭐⭐

Choose a Plan that Works for You

Upcoming Batches PST

 Weekday 

July 09(1 HR A DAY)
07:00 PM IST
Enroll Now  →

 Weekday 

July 30(1 HR A DAY)
07:00 AM PST
Enroll Now  →

 Weekend

July 26(1 HR A DAY)
07:00 PM PST
Enroll Now  →

Upcoming Batches IST

 Weekday 

July 10(1 HR A DAY)
07:00 AM IST
Enroll Now  →

 Weekday 

July 30(1 HR A DAY)
07:30 PM IST
Enroll Now  →

 Weekend 

July 27(1 HR A DAY)
07:30 AM IST
Enroll Now  →

Course Description

Okta Training, You certainly go through the advanced platform, which is a cloud-based identity security tool that connects all your applications, logins, and devices.

This course welcomes you with new categories too. Like it is a platform that runs upon identity-as-a-service, which is a subset of cloud computing.

Okta was the apparent option for us to handle the various cloud apps we use to run our company.

As you will attend Online Classes for this Training, you will learn a lot more things about Okta functionalities.

Okta offers cloud software that enables companies to automate and protect user authentication in applications and for developers to integrate identity controls into apps, websites, web services, and computers.

Okta Certified Professionals are well-versed in the principles of safe identity management and mobility. In addition, they have firsthand experience performing day-to-day organizational activities to assist Okta users.

Features

✅Lifetime access ✅Lifetime video access
✅Real-time case studies ✅The project integrated into the Curriculum
✅24*7 Support from our team of administrators

Course Content

1.Introduction to SSO

  • Identity and Access Management with Okta: An Introduction
  • Introduction to Workforce Identity
  • Manage Users and Groups in okta

2.Universal Directory, User and Group Management

  • Integrate Okta with Active Directory-Mastered Users
  • OKTA Universal Directory Concept                                                                     
  • Profile Editor Concept
  • Manage Application Single Sign-On (SSO)

3.Application Integration

  • SAML Application Configuration with OKTA
  • SWA Application Configuration with OKTA
  • Bookmark Application Configuration with OKTA
  • Open ID Connect Configuration with Okta
  • Oauth Configuration with Okta
  • Automate Lifecycle Management

4.Rules and Policy in okta

  • Implement Multifactor Authentication (MFA)
  • Implement Sign on Policy
  • Implement Application Sign on Policy
  • Group Rules
  • Authorization Server Rules

5.OKTA

  • Intro to OKTA

    • Compare OKTA with Active directory Federation Server
    • OKTA Architecture
    • OKTA Universal Directory Concepts
    • Groups and Group rules
    • Self-service registration
    • Profile Editor Concepts
    • Types of Administrators and their permissions
    • Implement and configure MFA
    • Configure adaptive MFA
    • Configure Networks
    • SAML Application Configuration with OKTA
    • SWA Application Configuration with OKTA
    • Bookmark Application Configuration with OKTA
    • OIDC Application Configuration with OKTA
    • Manage SSO and Provisioning
    • Reports and System log
    • Basic troubleshooting steps for OKTA in SAML perspective

6.API Access Management

  • API access Management
  • Use of API token
  • Configure Trusted Origin
  • Configure Authorization Server
  • Different Kind of Admin Role in okta                                                                       
  • Rest API
  • Use of API call in Postman
  • Learn about different kind of token Access token, ID token, Refresh Token
  • Learn about postman tool
  • Bulk user creation, Deletion by API call
  • Assigned Bulk User to a group by API call
  • Configure Universal Directory and User Profiles

7.Okta End User Support

  • Navigating the Okta Help Center
  • Modifying your OKTA instance look and feel
  • Walk Through of OKTA console and explain each topic in detail
  • Monitoring OKTA Trust Portal
  • Contacting OKTA Support in case of support
  • Best Configuration practices for an OKTA Instance

8.Troubleshooting

  • Different Kind of end User login issue
  • SAML based Application Troubleshooting
  • OIDC based Application Troubleshooting
  • Policy and MFA issues
  • Discuss Different Type of API call

9.Lab

  • How to Make Account in Okta
  • Create Users and groups in Okta
  • Create Group Rule
  • How to Make a server and deploy AD role into the server
  • AD integration with Okta
  • Service Now (Saml Based Application) Integration
  • Open ID Integration with OIDC debugger
  • Facebook Integration with okta (SWA bases Application)
  • Implementation of Password Policy
  • Creation of Network Zone
  • How to Generate reports in Okta
  • Configure MFA into different Application
  • Postman setup
  • Postman Setup with Okta
  • How to Use API Calls
  • Cover Each Tab of Okta

10.Requirements

  • Basic understanding of Identity and Access Management
  • Basic familiarity with Active Directory
  • Basic networking knowledge
  • Access to an Okta org (free trial is fine)
  • Access of Azure (Free trail is Fine)
  • Postman Tool
  • Laptop with Window 10/8

11.Students will learn how to

  • Integrate Okta into an existing organization
  • Identify the features and functions of Okta
  • Create and configure user accounts within Okta
  • Integrate Okta with AD
  • Create and manage groups
  • Configure applications for secure access
  • Configure password policies and multi-factor authentication
  • Many More (Full Okta Content mentioned above)

FAQ’s

(more…)

Palo Alto Training The only Network Course you need

Palo Alto Training The only Network Course you need

⏰24 hours | ▶️ 24 Videos | 📣 49 Participants |🎓 2940 Reviews | 4.8 ⭐⭐⭐⭐⭐

Choose a Plan that Works for You

Upcoming Batches PST

 Weekday 

July 10(1 HR A DAY)
07:00 PM PST
Enroll Now  →

 Weekday 

July 25(1 HR A DAY)
07:00 AM PST
Enroll Now  →

 Weekend 

July 26(1 HR A DAY)
07:30 PM IST
Enroll Now  →

Upcoming Batches IST

 Weekend 

July 11(1 HR A DAY)
07:30 AM IST
Enroll Now  →

 Weekday 

July 25(1 HR A DAY)
07:00 PM PST
Enroll Now  →

 Weekend 

July 27(1 HR A DAY)
07:30 AM IST
Enroll Now  →

Course Description

Palo Alto Training is an all-encompassing program that teaches you all they need to know to become successful in the field of Network Security and Security Engineering.

The capabilities of the Palo Alto Networks security platform are the primary emphasis of this course, which focuses on the core principles and technology that support such capabilities.

Palo Alto Class is divided into four main sections.
The first part of this lesson will focus on teaching you the foundations of network security as well as security engineering.

This covers a wide range of issues, some examples of which include the features of the Palo Alto Platform, the components of the frame relay protocol, the administration of the organization’s firewall, and the security rules of the Palo Alto platform.

The second section examines the technological hurdles that must be overcome in order to configure and manage the security platform offered by Palo Alto Networks.

You will get an understanding of risk management as well as potential dangers, as well as their own personal weaknesses.

Additional topics that will be covered include the deployment of security rules, security monitoring, and repair methods, protocol security, secure remote access, and SSL/TLS encryption technology.

Part three of this Palo Alto Online Training is dedicated to a comprehensive analysis of Palo Alto Networks’ innovative security offerings.

In this specific sequence, an in-depth study needs to be carried out on the Security Management Console, the Security Services Processor, the Identity-Based Access control, virtual private networks, and threat prevention systems.

Only then you will be able to achieve this objective.

The course’s final unit covers a wide range of material, from traffic analysis and categorization to application annex management to data loss protection.

When you have completed this part of the course, you will have a better grasp of security compliance, how to pick the appropriate security solutions, and how to apply the Palo Alto Networks security platform for applications that are utilized in the real world.

Additionally, the Palo Alto Certification course covers subtopics such as security policy and rule-based administration, diagnostics, reliable backup and recovery, and malware protection.

You will gain knowledge of how to prevent possible assaults while also enhancing the effectiveness of the Palo Alto Firewall as the course progresses.

After successfully completing the course, you will be equipped with the knowledge and abilities necessary to select and protect the most cutting-edge network security solutions now available on the market.

When you have completed the Palo Alto Course and achieved a passing grade will be equipped with the knowledge and skills necessary to effectively protect an organization from threats to its network and attacks on its network.

The acquisition of this information and those abilities is necessary for success.

They will be able to understand the security implications of distributed networks, create and carry out rules for comprehensive security, and protect endpoints from harmful attacks.

This ability will allow them to effectively use the platform.
Seize upon the Palo Alto Training from CloudFoundation, it is the ideal online learning platform for today’s ever-changing digital environment.

Courses include web development basics through cloud computing. You will get 24*7 assistance from our experts to quench your queries.

Features

✅Lifetime access ✅Lifetime video access
✅Real-time case studies ✅The project integrated into the Curriculum
✅24*7 Support from our team of administrators

Course Content

1.Platforms and Architecture

  • Introduction of firewall
  • Single Pass Architecture and Flow Logic
  • Parallel processing of Palo Alto
  • Types of firewall
  • State full inspection of Firewall
  • Packet Filtering Firewall
  • Application aware firewall
  • Basic Wire shark packet analysis (ICMP, DNS, TCP, UDP SSH, SSL)

2.Initial Configuration

  • Initial Access to the System
  • Introduction of Palo alto CLI
  • Control plane and data plan in Palo Alto
  • Difference between Operational mode and Configuration mode
  • Configuration Management
  • Licensing and Software Updates
  • Account Administration
  • Difference between Candidate configuration and running configuration

3.Interface Configuration

  • Introduction to Security Zones
  • Layer 2 deployment of Palo Alto
  • Layer2 deployment with logical vlan interface
  • Layer2 deployment with same vlan /different vlan
  • TAP mode deployment with Scenario
  • V-wire mode deployment of Palo Alto
  • Layer 3 configuration of Palo Alto interface
  • Sub-interfaces Configuration and Inter-vlan Routing
  • Service route configuration on interface
  • DHCP Configuration
  • Introduction of Virtual Router
  • Virtual Router Scenario based configuration

4.Security and NAT Policies

  • Security Policy Configuration
  • Policy Administration
  • Interazone, interzone rule and Cleanup Rule
  • NAT Configuration
  • PAT on Firewall interface
  • Dynamic NAT with pool IP
  • Proxy Arp concept and understanding
  • Static Bi-directional NAT Configuration
  • U-Turn NAT Configuration Same zone (double NAT configuration)
  • U-Turn NAT Configuration Different Zone (Inter zone)
  • Destination NAT configuration on Pool IP (load distribution)
  • PORT Forwarding / Static PAT configuration
  • External Pool NAT configuration and flow
  • Virtual wire Netting configuration

5.App-ID™

  • Application ID Signature based Inspection of Palo alto
  • Flow Logic of App ID
  • Application ID Terms Understanding (Incomplete, Insufficient Data, Unknown TCP/UDP)
  • Configuration of APP ID (Security Rule base)
  • Custom App-ID signature creation of (URLS for Particular Pattern)
  • App ID with Outbound SSL Inspection

6.Content-ID™

  • Antivirus
  • Anti-spyware
  • Vulnerability
  • URL Filtering
  • File Blocking: Wildfire

7.Encryption /Decryption

  • Certificate Management
  • Theory of SSL /TLS
  • Outbound SSL Decryption
  • Inbound SSL Decryption

8.User-ID™

  • Enumerating Users
  • Mapping Users to IP addresses
  • User-ID Agent and LDAP Configuration

9.VPN Configuration

  • Theory of IPsec Protocol Suit
  • Details of Packets (PHASE-1, PHASE-2)
  • Difference between Main mode and aggressive mode
  • Difference between Policy based VPN and Tunnel based VPN
  • IPSec Tunnels between Palo alto firewall
  • IPSec Tunnel between Palo alto and Cisco Device/Checkpoint Gateway
  • Implementation of Dynamic routing protocol in Route based VPN (OSPF Configuration)
  • Scenario Based Troubleshooting in Palo alto (PCAP File Analysis)
  • Advance debug command in Palo Alto for VPN Troubleshooting
  • Introduction of remote access VPN
  • Global protect VPN configuration / SSL VPN for remote Users
  • Global Protect Portal
  • Global Protect Gateway

10.Management & Reporting

  • Introduction of Dashboard
  • ACC (Application command center)
  • Basic Logging
  • Log Analysis and filtering
  • System Alters and log
  • Basic Reports

11.Active/Passive High Availability

  • Understanding of High Availability
  • Palo alto active/passive HA configuration
  • Theory of HA Control Link DATA Link
  • Palo Alto active /active configuration with Floating ip
  • Palo Alto active/active configuration with arp load balancing
  • Active/Active NAT configuration

12.Routing Configuration and PBR

  • Understanding of Palo Alto Routing table, Forwarding Table
  • Understanding of Path Monitoring in Palo Alto
  • ECMP (Equal cost Multiple Path) Configuration with Dual ISP
  • ECMP Load-Balancing Algorithms
  • Introduction of OSPF routing and configuration
  • Introduction of BGP routing and configuration
  • Policy based routing configuration and testing with dual ISP
  • Understanding of Metric and administrative distance (virtual Router)

13.Panorama

  • Centralized Configuration and Deployment
  • Centralized Logging and Reporting
  • Role-Based Access Control
  • Difference Between pre rule, post rule and Default rule.

14.Advance Trouble Shooting and packet capture

  • Packet dig command use in Palo alto
  • Graphic mode packet capture
  • Directory system of Pan OS and daemons
  • Log capture for live traffic and analysis
  • Test policy command for NAT and security Rules
  • Use of grep command to search pattern
  • Use of mp-log and dp-log in palo alto

FAQ’s

(more…)

Saviynt Training – The only IAM Course you need

Saviynt Training – The only IAM Course you need

⏰24 hours | ▶️ 24 Videos | 📣 11752 Participants | 🎓 5426 Reviews | 4.9 ⭐⭐⭐⭐⭐

Choose a Plan that Works for You

Upcoming Batches PST

 Weekday 

July 09(1 HR A DAY)
07:00 PM PST
Enroll Now  →

 Weekday 

July 30(1 HR A DAY)
07:00 AM PST
Enroll Now  →

 Weekend

July 26(1 HR A DAY)
06:00 PM PST
Enroll Now  →

Upcoming Batches IST

 Weekend 

July 10(1 HR A DAY)
07:30 AM IST
Enroll Now  →

 Weekday 

July 30(1 HR A DAY)
07:30 PM IST
Enroll Now  →

 Weekend 

July 27(1 HR A DAY)
07:30 AM IST
Enroll Now  →

Course Description

Saviynt Training purely details you with the information regarding its uniform Access and Identity management system.

Saviynt stands as the topmost IAM tool to learn more by enrolling in online classes offered by the best websites.

With the aid of user identity passwords, IAM secures the organization from unauthorized access.

You undeniably thank your trust after taking up this course.

The reason is that, as you see, there are many products and platforms available in Saviynt, like Infrastructure Access Governance, Data Access Governance, and many more like this.

Through Saviynt, you can learn how Organizations use Saviynt to identify and implement IAM policies and link IAM functions to meet audit and enforcement requirements.

The Certification in Saviynt is like a step-by-step procedure that the more you get into the course, the more certification exams you can write. The four variants of Certification are Developer, Architect, Administrator, and  Manager.

Features

✅Lifetime access ✅Lifetime video access
✅Real-time case studies ✅The project integrated into the Curriculum
✅24*7 Support from our team of administrators

Course Content

1.Company Overview and Course Introduction

  • Identity Management Overview
  • Saviynt Corporate Overview

2.Building Identity Warehouse

  • Introduction
  • Data Model
  • User Import
  • Application Import
  • Role Import
  • Use case – Import the user and its application account
  • Module Summary

3.Access Request System

  • Introduction
  • Access Request System Overview
  • Different Types of Access Requests
  • Application Access Request Overview
  • Role Access Request Overview
  • Setup Access Request for Applications
  • Setup Access Request for Roles
  • Manage and Configure approval logic
  • Use case – Simplify the Application Request Access for Enterprise
  • Module Summary

4.Rules Engineering

  • Introduction
  • Overview and Types of Identity Access Rules
  • Technical Rule-Demo
  • Technical Rule Setup
  • User Update Rule-Demo
  • User Update Rule Setup
  • Use case for Joiner Scenario
  • Use case for Leaver Scenario
  • Module Summary

5.Segregation of Duties

  • Introduction
  • Overview of Segregation of Duties for IGA
  • SOD Rule set Architecture in Saviynt
  • Preventative SOD Feature Overview
  • Preventative SOD Configuration Overview
  • Detective SOD Feature Overview
  • Detective SOD Configuration Overview
  • SOD Reports
  • Use case to demonstrate Preventative SOD
  • Use case to demonstrate Detective SOD
  • Module Summary

6.Access Certification

  • Introduction
  • Overview of Access Review Campaigns
  • User Manager Access Review Features
  • User Manager Access Review Configuration
  • Entitlement Owner Access Review Features
  • Entitlement Owner Access Review Configuration
  • Role Owner Access Review Features
  • Role Owner Access Review Configuration
  • Use case for Manager Access Review Campaign
  • Module-Summary

7.Saviynt Analytics

  • Introduction
  • Analytics Overview
  • Different types of Analytics Reports
  • Setting up Analytics Reports
  • Use case of Saviynt Analytics
  • Module Summary

FAQ’s

(more…)