Chapter 13. Identity Management in RHEL in a controlled environment: a proof of concept
Explore basic features and concepts of Identity Management in RHEL (IdM) in a safe, isolated sandbox environment.
Gain hands-on experience with the following:
- Installing a minimal IdM cluster consisting of an IdM server, replica, and client by using Ansible automation.
-
Configuring authentication and various access controls through the IdM Web UI, focusing on host-based access control, role-based access control, and
sudorules. - Performing the same authentication and access control configurations with Ansible, discovering the simplicity, automation, and scalability that Ansible playbooks bring to system management.
Deploying Identity Management in a controlled environment: a proof of concept is designed to help you test and familiarize yourself with various IdM capabilities, preparing you for deployment in a production environment. It is not intended for direct use in production.