Introductory and advanced Hitachi ID Privileged Access Manager training is available.

Topics in this course include:

  • Introduction to Hitachi ID Privileged Access Manager
  • Installation
    • Privileged Access Manager architecture
    • Installing Privileged Access Manager
    • Installing Connector Pack
  • Using the administration web portal
  • Target systems
    • About target systems
    • AD target (source of profiles)
    • AD target (inventory system)
    • Linux target
  • User profiles and auto discovery
    • User profiles

    • How auto discovery works
    • Running and troubleshooting auto discovery (psupdate)
  • E-mail and incident management integration.
    • E-mails to users
    • E-mails to admins
    • Incident integration
  • Groups
    • How groups are managed
    • Adding managed groups
  • User classes
    • How user classes are used
    • Adding a user class
  • Managed systems
    • Modes: Push, local service, vault-only
    • Adding push-mode managed systems

  • Managed system policies
    • How managed system policies are used
    • Default policies
    • What managed system policies can control
  • Request / approval workflow
    • Using apps
    • Privileged access request workflow
    • Types of authorization workflow -- static, dynamic, phased
    • Profile and request attributes
    • Un-approving requests
    • Checking in privileged access
    • Assigning authorizers
    • Requesting account access
    • Dynamic authorization
  • Delegation
    • How requests are delegated
    • Delegating authority
  • Escalation
    • How escalations work
    • Configuring escalation
  • Account sets
    • Managing account sets
    • Requesting access to account sets
  • Group sets
    • About temporary group membership
    • Adding group sets
    • Requesting temporary group membership
  • Auto discovery / import rules
    • Configuring Privileged Access Manager to automatically discover computer systems and accounts
    • Configuring import rules to manage systems
    • Planning for infrastructure auto discovery
  • Session monitoring
    • Session monitoring architecture
    • Planning session monitoring
    • Hardware requirements
    • Session monitoring use cases
    • Setting up and activating session monitoring
    • Downloading and viewing a recorded session package
  • User types and access rules
    • Overview of user types
    • Product administrators
    • Self-service and help desk users
    • Controlling who can request privileged access
    • Segregation of duties
  • Embedded credentials in scripts and configuration files
    • Solving the problem of embedded passwords in programs and scripts
  • Replication and disaster recovery
    • Common cases
    • Shared schema
    • Database replication
    • File replication
    • Replication design
    • Monitoring replication
    • Notification of problems
    • Disaster recovery scenarios
    • Setting up replication
  • Reporting and surveillance
    • Dashboards and reports
    • Saving and scheduling reports
  • Maintenance
    • Services
    • Scheduled jobs
    • Logs and data analysis
    • Health check monitor
  • Hitachi ID Identity Express and component framework
    • About component framework
    • Reference builds
    • Managing components
  • Service accounts on Windows systems
  • How Privileged Access Manager manages services accounts
  • Subscriber notification
  • Authentication chains
    • Authentication modules
    • Modifying default authentication methods
    • Mobile phones and other authentication factors
  • GUI modifications
    • Skins for different languages / user populations
    • Macro system
    • Generating skins
    • Customizing appearance
  • Upgrading