eviden-logo

Evidian > Services > Training > Catalogue > Evidian E-SSO Advanced Architectures & Configurations, and Evidian Authentication Manager for Strong Authentications Training

Evidian E-SSO Advanced Architectures & Configurations, and Evidian Authentication Manager for Strong Authentications Training

Advanced Architectures & Configurations of Evidian Enterprise SSO, and Strong Authentications in Evidian Authentication Manager: Specific course, developed on request

Duration: depending on the volume of subjects to be covered

Objectives:

Be able to participate in installation & configuration services and deployment activities relating to complex Enterprise Access Management solutions

Prerequisites:

Knowledge of Windows 2K+ and directories architecture.The course manual is in English.
Full knowledge about all Enterprise Access Management (E-SSO & Authentication Manager) Basic Course subjects.
The course manual is in English.

Contents:

The items that can be covered include:

  • Advanced SSO
    • Use of all the predefined plugins including “Bad password”, “Bad new password”
    • SSO data on-card storage
    • Emulators
      • Emulators without scripting or API interface
        • Limitation of this type of emulator
        • Use of Custom scripts
      • Script OLE interface
        • How to develop a script for an emulator having OLE interface
      • HLLAPI interface
        • Method to check the emulator configuration
        • Configuration of SSO Studio for HLLAPI
    • Common problems solved by custom scripts
      • How to use SPY
      • How to force a Password change
      • Variable field identifier management
      • Complex Custom Scripts using DLL
    • HTML Customization
    • Web portal customization
    • Web service programming
  • Strong Authentication
    • SmartCard Management
      • Architecture of a Card Management System
      • XML file structure
      • How to retrieve cards information
      • How to take a new card into account
    • External CMS
    • RFID tokens
    • Biometrics (Store-on-PC, Store-on-Card, Store-on-Server)
    • PKA
      • How to use certificates in E-SSO environment (administration and authentication)
  • Complex architectures
    • Use cases
    • Associated servers in multi-domain/inter-domain environments
    • Enterprise Access Management LDAP directories other than AD (cooperative and non-cooperative modes),
    • station configuration against these directories
    • E-SSO and Terminal servers, Citrix, …
    • Migration
  • Audit Report customization

Product version: 10

Methods: Presentations, Demonstrations, Labs

Standard price: dépending on the duration, preparation included.

Number of participants per session: 4 participants max

Evidian Products - Protect your company from cyber attacks by unauthorized users

Identity as-a-service

Evidian takes care of everything related to your Identity and Access Management with IDaaS

Learn more   >

Identity Governance and Administration

Manage access and authorization of all your users in your company

Learn more   >

Web Access Manager

Gateway for web apps with SSO, multi-factor authentication, identity federation

Learn more   >

Analytics

Monitoring and powerful reporting for regulatory compliance

Learn more   >

Authentication Manager

Authentication Manager

Enterprise multi-factor & passwordless authentication on Windows PCs

Learn more   >

Enterprise Single Sign-On (SSO)

Secure access to legacy and web apps on PCs & mobiles with SSO

Learn more   >

Self Service Password Reset (SSPR)

Reset Windows passwords online and offline

Learn more   >

SafeKit

High availability software for Evidian and partner applications

Learn more   >

Evidian IAM leader in the French and German markets and in U.S. Public Sector

Evidian IAM

Evidian IAM cyber security tools and solutions – Leader in Identity and Access Management in France

Evidian IAM

Evidian IAM cyber security tools and solutions – Leader in Identity and Access Management in Germany

Evidian IAM

Evidian IAM cyber security tools and solutions – Leader in Identity and Access Management in U.S. Public Sector

What are IAM cyber security tools and solutions?