<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="36188" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/opentext-3-7230" lastchanged="2025-07-29T12:18:45+02:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>NetIQ Access Manager Foundations</title><productcode>3-7230</productcode><vendorcode>MF</vendorcode><vendorname>OpenText</vendorname><fullproductcode>MF-3-7230</fullproductcode><version>5.1</version><objective>&lt;p&gt;On completion of this course, participants should be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Identify the Access Manager solution.&lt;/li&gt;&lt;li&gt;Describe the difference between appliance and component installations.&lt;/li&gt;&lt;li&gt;Build and configure a Reverse Proxy.&lt;/li&gt;&lt;li&gt;Configure SSL for a self-signed environment.&lt;/li&gt;&lt;li&gt;Identify Risk Management.&lt;/li&gt;&lt;li&gt;Create and utilize Classes, Methods, and Contracts, and how to use them in Policy and Proxies.&lt;/li&gt;&lt;li&gt;Create and utilize role-based decision making&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;To be successful in this course, you should have the following prerequisites or knowledge:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A basic understanding of the concept of Access Management.&lt;/li&gt;&lt;li&gt;An understanding of NetIQ eDirectory, NetIQ Identity Manager, and Linux.&lt;/li&gt;&lt;li&gt;A familiarity with basic web services, HTTP Requests and Responses, HTML tags, and server-side dynamic content (JSP, ASP, or similar), and having familiarity with PHP, JavaScript, ECMAscript, or RESTful scripting is required.&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;All members of the project teams, including security, architects, project managers, developers, administrators, and operations personnel.&lt;/p&gt;</audience><contents>&lt;h5&gt;Chapter 1: Configuring the Administration Console&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describing Access Manager concepts.&lt;/li&gt;&lt;li&gt;Describing Access Manager deployment options.&lt;/li&gt;&lt;li&gt;Configuring the Administration Console.&lt;/li&gt;&lt;li&gt;Additional Adjustments.&lt;/li&gt;&lt;li&gt;Troubleshooting installation issues.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 2: Configuring Access Gateway Service&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Connecting the IDP to the IDM Server.&lt;/li&gt;&lt;li&gt;Describing the NetIQ Access Manager clusters.&lt;/li&gt;&lt;li&gt;Explaining Access Gateway configuration.&lt;/li&gt;&lt;li&gt;Adding an advanced File Configurator.&lt;/li&gt;&lt;li&gt;Adding Additional Administrators.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 3: Rewriting Web Code&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Rewriting Web Content.&lt;/li&gt;&lt;li&gt;Validating Web Content.&lt;/li&gt;&lt;li&gt;Configuring the Pin List and other options.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 4: Configuring Reverse Proxies&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Configuring Network Settings to support multiple websites.&lt;/li&gt;&lt;li&gt;Explaining Proxy configuration.&lt;/li&gt;&lt;li&gt;Explaining Web Proxy logging.&lt;/li&gt;&lt;li&gt;Describing Proxy logic.&lt;/li&gt;&lt;li&gt;Creating additional power users.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 5: Enable and Protect NAM Websites&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explaining the SSL.&lt;/li&gt;&lt;li&gt;Describing the SSL mechanics.&lt;/li&gt;&lt;li&gt;Enabling SSL inside Proxies.&lt;/li&gt;&lt;li&gt;Enabling and protecting NAM websites with SSL Certs.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 6: Authentication&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explaining the Authentication Framework.&lt;/li&gt;&lt;li&gt;Authenticating to a Site.&lt;/li&gt;&lt;li&gt;Describing Classes, Methods, and Contracts.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 7: Configuring Domain and Multi-Homing&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Preparing for Multi-Homing.&lt;/li&gt;&lt;li&gt;Configuring Multi-Homing.&lt;/li&gt;&lt;li&gt;Explaining web server acceleration.&lt;/li&gt;&lt;li&gt;Identifying the types of Proxy options.&lt;/li&gt;&lt;li&gt;Configuring the Proxy.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 8. Mitigating Risk&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introducing the Policy.&lt;/li&gt;&lt;li&gt;Creating and managing a Risk Policy.&lt;/li&gt;&lt;li&gt;Explaining how Risk works?&lt;/li&gt;&lt;li&gt;Detailing the Integration.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 9: Modifying the Portal Interface&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Customizing the Identity Server pages.&lt;/li&gt;&lt;li&gt;Customizing the Identity Server messages.&lt;/li&gt;&lt;li&gt;Customizing the Access Gateway error messages.&lt;/li&gt;&lt;li&gt;Customizing the Access Gateway logout requests.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 10: Using Appmarks and Enabling Mobile&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explaining the Web Access portal&lt;/li&gt;&lt;li&gt;Configuring Mobile Access.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 11: Applications Configuration Using Roles&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Reviewing Policy.&lt;/li&gt;&lt;li&gt;Identifying the Access Manager roles.&lt;/li&gt;&lt;li&gt;Explaining the Access Manager Authorization.&lt;/li&gt;&lt;li&gt;Explaining how it works (Business Case).&lt;/li&gt;&lt;li&gt;Using the Policy Troubleshooting tools.&lt;/li&gt;&lt;li&gt;Troubleshooting steps.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 12: Advanced Applications Configuration&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Overview of Identity Injection.&lt;/li&gt;&lt;li&gt;Explaining basic and custom Header Options.&lt;/li&gt;&lt;li&gt;Using Form Fill Options.&lt;/li&gt;&lt;li&gt;Using Form Fill Shared Secrets.&lt;/li&gt;&lt;/ul&gt;</contents><objective_plain>On completion of this course, participants should be able to:


- Identify the Access Manager solution.
- Describe the difference between appliance and component installations.
- Build and configure a Reverse Proxy.
- Configure SSL for a self-signed environment.
- Identify Risk Management.
- Create and utilize Classes, Methods, and Contracts, and how to use them in Policy and Proxies.
- Create and utilize role-based decision making</objective_plain><essentials_plain>To be successful in this course, you should have the following prerequisites or knowledge:


- A basic understanding of the concept of Access Management.
- An understanding of NetIQ eDirectory, NetIQ Identity Manager, and Linux.
- A familiarity with basic web services, HTTP Requests and Responses, HTML tags, and server-side dynamic content (JSP, ASP, or similar), and having familiarity with PHP, JavaScript, ECMAscript, or RESTful scripting is required.</essentials_plain><audience_plain>All members of the project teams, including security, architects, project managers, developers, administrators, and operations personnel.</audience_plain><contents_plain>Chapter 1: Configuring the Administration Console


- Describing Access Manager concepts.
- Describing Access Manager deployment options.
- Configuring the Administration Console.
- Additional Adjustments.
- Troubleshooting installation issues.
Chapter 2: Configuring Access Gateway Service


- Connecting the IDP to the IDM Server.
- Describing the NetIQ Access Manager clusters.
- Explaining Access Gateway configuration.
- Adding an advanced File Configurator.
- Adding Additional Administrators.
Chapter 3: Rewriting Web Code


- Rewriting Web Content.
- Validating Web Content.
- Configuring the Pin List and other options.
Chapter 4: Configuring Reverse Proxies


- Configuring Network Settings to support multiple websites.
- Explaining Proxy configuration.
- Explaining Web Proxy logging.
- Describing Proxy logic.
- Creating additional power users.
Chapter 5: Enable and Protect NAM Websites


- Explaining the SSL.
- Describing the SSL mechanics.
- Enabling SSL inside Proxies.
- Enabling and protecting NAM websites with SSL Certs.
Chapter 6: Authentication


- Explaining the Authentication Framework.
- Authenticating to a Site.
- Describing Classes, Methods, and Contracts.
Chapter 7: Configuring Domain and Multi-Homing


- Preparing for Multi-Homing.
- Configuring Multi-Homing.
- Explaining web server acceleration.
- Identifying the types of Proxy options.
- Configuring the Proxy.
Chapter 8. Mitigating Risk


- Introducing the Policy.
- Creating and managing a Risk Policy.
- Explaining how Risk works?
- Detailing the Integration.
Chapter 9: Modifying the Portal Interface


- Customizing the Identity Server pages.
- Customizing the Identity Server messages.
- Customizing the Access Gateway error messages.
- Customizing the Access Gateway logout requests.
Chapter 10: Using Appmarks and Enabling Mobile


- Explaining the Web Access portal
- Configuring Mobile Access.
Chapter 11: Applications Configuration Using Roles


- Reviewing Policy.
- Identifying the Access Manager roles.
- Explaining the Access Manager Authorization.
- Explaining how it works (Business Case).
- Using the Policy Troubleshooting tools.
- Troubleshooting steps.
Chapter 12: Advanced Applications Configuration


- Overview of Identity Injection.
- Explaining basic and custom Header Options.
- Using Form Fill Options.
- Using Form Fill Shared Secrets.</contents_plain><duration unit="d" days="4">4 days</duration><pricelist><price country="DE" currency="EUR">3200.00</price></pricelist><miles/></course>