Secret Server Courses:
This video details how to plan for and complete the installations for Secret Server and Privilege Manager.
Duration: 26 minutes
In this video demonstration, you will learn how to:
- configure SAML (Security Assertion Markup Language) in IBM Security Secret Server (ISSS)
- configure Secret Server application in Cloud Identity
- register SAML identity provider
- troubleshoot the configuration
In this demonstration, learn how to:
- Enable SAML authentication
- Configure SAML service provider
- Configure reverse proxy
- Configure a SAML 2.0 identity provider federation
- Download the federation's metadata XML
- Add a partner to the federation
- Add the federation to the reverse proxy
- Import the identity provider's metadata XML
In this video, you will learn about Secret Server local groups.
Local groups are managed and created solely in Secret Server.
Duration: 4 minutes
Learn how to add and use SSH Key Dependencies in Secret Server
In this video, you will learn about Secret Server local users.
Local Secret Server accounts are non-domain user accounts that are created and managed soley in Secret Server.
Duration: 4 minutes
In this course, you will learn about the Secret Server roles and permissions, as well as, local users and groups.
Topics covered include:
- create a customer role
- analyze default roles
- identify role assignments
- create a local user
- assigning role permissions and roles attributed to the local group
Duration: 12 minutes
- Secret Server Overview which includes information on Secrets, Launchers, Session Monitoring, SSH Command Menus, and Discovery
- Configuration which includes information on Active Directory Authentication, Discovery, Secret Templates, Launchers, Remote Password Changers and Distributed Engine
- Troubleshooting for topics such as Secret Server, Launchers, Remote Password Changers and Distributed Engines
- Understand Secret Server's alerting options and SIEM integration
- Know how Secret Server can alert you about different kinds of actions taking place in the tool
- Know how to integrate your SIEM or log management tool within Secret Server to have better visibility of activity within the tool
This course for auditing and reporting and auditing/reporting troubleshooting will show you how to:
- Understand the Secret Server auditing and reporting capabilities
- Access a user and secret audit
- Access the reporting function and know which reports are the most useful to you
- Set up a schedule to provide reports to appropriate users
- Understand how to access an updated report
- Know how to customize the reporting screen
- Know how to access the Security Hardening and User Audit reports
- Understand how to access logs and what logs are available
- Know common techniques used to troubleshoot Secret Server's audit and reporting capabilities
- Understand how to use Secret Server's capabilities to automate management of service accounts
- Learn how to manage service accounts in your environment
- Know what dependencies are stored in the secret
- Learn how to add dependencies to secrets
- Know things to consider when managing secret dependencies
This Secret Server course provides details on the Distributed Engine. Distributed Engine has three components:
This video series describes the following topics:
- Sites - logical groupings of work items
- Site Connectors - the Windows services that hold the data for sites
- Engines - the components that do the actual work
- Secret Server Distributed Engines overview - covers the supported functions and components
- How to enable Distributed Engine within Secret Server
- How to configure and manage Distributed Engine's sites and engines
- How to configure and manage the MemoryMQ and rabbitMQ site connectors
Learn about standard and
extensible discovery capabilities, including common techniques for
troubleshooting secret server discovery.
Learn about Secret Server session recording and monitoring capabilities, and common techniques used to troubleshoot recording.
In this course, you learn the best practices for securing your IBM Security Secret Server instance. Practices include: assigning roles, two-factor authentication, and securing encryption keys.
This video details the system requirements for Secret Server installations. Recommended system requirements are discussed for:
- Basic deployments
- Advanced deployments
You will also be provided with additional information on system requirements for servers used for Secret Server.
Time: 3 minutes
Secrets are individually named sets of sensitive information created from Secret templates.
In this series of videos, you will learn about troubleshooting key areas, such as templates, plugins, inactive Secrets, searching Secrets, and unlimited administration mode.
Learn about two-factor authentication in Secret Server.
This video walks you through Secret Server's roles and permissions. Each Secret Server user must be assigned a role. Secret Server's method for regulating permission to system access is role-based security.
Time: 5 minutes
Learn about Secret Server disaster recovery and high availability.
Learn about Secret Server available API's
Learn how to configure advanced session recording in Secret Server.
Setting up Active Directory is one of the first steps that should be
taken in the enterprise environment after IBM Security Secret Server
The presentation explains Active Directory
integration, why it is needed, requirements, and how to set it up.
This video provides three sections:
- Details on Active Directory integration
- Q and A
Learn about multi-tier workflow.
Secrets are individually named sets of sensitive information created from Secret templates. In this course, you will learn how to create and customize Secrets in IBM Security Secret Server.
In this course, you learn how to use and customize Secret Server's Dashboard, and also learn how to create and use Secret Server folders.
In this course, you learn about common methods used to troubleshoot basic configurations, such as troubleshooting Active Directory sync, integrated Windows authentication, and user access and permissions. You will also walk through using logs and diagnostics.
- Understand the purpose of the password changing feature
- Know how to enable and configure password changes
- Understand specific password changing steps necessary for certain platforms, such as web platforms
- Provide an overview of the Secret Server upgrade process
- Understand the necessary prerequisites for performing an upgrade
- Know what steps are involved when performing an upgrade
- Know hot to troubleshoot issues when performing an upgrade
Learn about new Secret Server v10.6.1 User Interface.
Learn how to configure IBM Security Secret Server groups, roles, permissions, user management, user preferences, and Admin settings.
- Know the Secret Server installation prerequisites
- Learn where to download .NET framework 4.5.1 for installation
- Understand how to install Internet Information Services (IIS)
- Understand how to install SQL Server Express and know the recommended SQL versions
- Know the required steps for the Secret Server MSI installer
- Learn how to install a Secret Server license
- Learn how to determine who needs access, what permissions to apply and how to organize sensitive data using best practices in Secret Server
- Learn about the Secret Server's workflow features and what they do
- Understand the workflow capabilities, options and why features are used together
- Know how to create a one time password using the check out feature which forces accountability on secrets by granting exclusive access to a single user
- Set up the doublelock feature to secure your sensitive data
- Use the request for access feature to require that a user is granted approval to access a password or Secret for a specified amount of time
- Learn how to integrate your ticketing system with Secret Servder
In IBM Security Secret Server, administrators can create groups called teams to restrict what users can see.
NOTE: This course is using IBM Security Secret Server v10.6.1.
Learn about Secret Server launcher capabilities and common techniques used to troubleshoot launchers.
Launchers provide direct access and authentication into remote machines.
- Learn how to integrate Privilege Manager with Secret Server
- Use Secret Server as Privilege Manager's storage container for credentials
- Understand how the REST API is used for communication with Privilege Manager from Secret Server