This learning path will provide and understanding of the required elements necessary to support a deployed Fischer Identity solution in both a single and multi tenant model, independent of an on-premise or cloud installation.
The focus of this path will be: Solution Troubleshooting, Solution Transition / Validation, Solution Operational Requirements, and Solution Optimization.
Participants are expected to have an understanding of the following skills or concepts:
- Experience in managing an incident / response support queue related to user access issues.
- Experience in monitoring production applications to ensure organizational defined availability and performance metrics
- Customer first mindset
- Experience with troubleshooting solution based issues, with a focus not only on resolution but solution efficiencies.
- Understand basic programming concepts and terms
Est Duration: 26.5 hrs
Course Curriculum
Fischer Identity Glossary of Terms
This course will cover all the commonly used IAM terms. In another courses you will learn to walk the walk, after this course you will be able to talk the talk.
Est Duration: 75 mins
Fischer Identity - Implementations Standard Operating Procedures
This course contains information about the Implementations Framework and Standard Operating Procedures (SOPs) to be followed by Implementation Engineers while deploying a Fischer Identity Suite solution.
Est Duration: 2 hrs
Fischer Identity's - Compliance Feature Overview
This course will provide a review of the Fischer Identity Compliance feature.
Compliance is the most significant reason for an organization to deploy Identity Governance and Administration technology. Students will learn how to best utilize this feature to implement solutions that help businesses meet the requirements needed in order to satisfy governance regulations such as SOX, HIPAA, FERPA, & GDPR.
Upon completion of this course students will have an understanding of the capabilities of this feature and how to deploy solutions to provide regulatory compliance, utilizing Fischer's easy to use and configure administrative and self-service user interfaces.
Est Duration: 3 hrs 20 min
Fischer Identity's Password Management Capability Review
This course will provide an understanding of the Password Management capabilities of the Fischer Identity platform. Students will learn how to configure the necessary Password Management features required to provide a password enforcement framework that allow customers to meet their current security regulations and internal corporate objectives.
Est Duration: 60 mins
Fischer Identity - Password Sync Review
This course will provide an overview of the different configurations that are required to enable the Password Sync functionality of the Fischer Identity Password Management solution.
Est Duration: 30 mins
Fischer Identity's - Approval Feature Functionality and Overview
This course will provide a review of the Fischer Identity Approval feature. Students will learn that this feature will allow them to implement an N-level approval hierarchy without requiring a development effort to achieve their desired objectives. This approach is dramatically different than other Identity products on the market today.
As you will see this complexity is accomplished via the easy to use and initiative out of the box configurations available on the Fischer Identity platform.
Est Duration: 1 hr 15 mins
Fischer Identity's Authentication Capability Review
This course will provide an understanding of the Authentication capabilities of the Fischer Identity platform.
Students will learn how to configure the necessary features to provide an authentication framework that enables customers to meet the application security requirements as defined by the business, while streamlining the user login experience.
Est Duration: 1 hr 45 mins
Fischer Identity's Self-Service Capability Review
This course will provide an understanding of the Self-Service capabilities of the Fischer Identity platform.
Students will receive an overview of the features and configurations associated with Self-Service. By implementing these features, organizations are able to provide end users with a tool set that enables them be more self-sufficient and less reliant on that organization's help desk.
Est Duration: 1 hr 30 mins
Fischer Identity's - Authorization Feature Overview
This course will provide an understanding of the Authorization capabilities of the Fischer Identity platform.
Students will learn how to configure a security framework that controls the authorization enforcement for the user identities that have authenticated to the platform.
This framework enables organizations to control the capabilities that are presented to users upon a successful login event.
Est Duration: 2 hrs
Fischer Identity's - Data Mapper Rule Review
This course will provide an overview of the Data Mapper Rules utilized by the Fischer Identity Workflow and Connectivity Studio. It is through the use of these rules that Implementation Engineers can focus on achieving their desired workflow results, without worrying about specific programming languages and syntaxes.
Students will learn which rules are used in the most common implementation scenarios and the proper use and configurations of these data manipulation rules. Additionally, this course will review a categorization of these rules and the frequency of when they are used.
Upon completion of this course students will have an understanding of each of the current data mapper rules supported within the Fischer Identity workflow framework and know just when to use the right rule at the right time.
Est Duration: 3 hrs
Fischer Identity Workflow Studio
This course will provide and overall understanding of the Fischer Identity Workflow & Connectivity Studio (Designer). Upon completion of this course students will have an understanding of the applications use, components and capabilities. The following areas will be covered: Installation Pre-Reqs, Installation, Studio Components, Workflow Mechanics, Studio Optimization, and Example Workflow Scenarios.
Est Duration: 30 mins
Fischer Identity's - Basic Workflow Configuration
This course will become the starting point of understanding basic configurations required for later courses related to solution design and implementation best practices.
Upon completion of this course students will have an understanding of the basic workflow structure, components and configurations that go into configuring provisioning processes.
It will become the starting point of understanding that will be required for later courses related to solution design and implementation best practices.
Est Duration: 60 mins
Fischer Identity's - Advanced Workflow Configuration
This course will provide a deeper understanding of workflow development. It will be through this course that students will be provided and in-depth view into the advanced concepts and objects related to implementing solution with the Fischer Identity Workflow and Connectivity Studio.
Upon completion of this course students will have the tools necessary to being providing the solutions to meet the current and future customer IAM requirements.
Est Duration: 2 hrs 30 mins
Fischer Identity's - Provisioning & De-Provisioning of Users via Roles
This course will provide an overview of the Fischer Identity implementation approach related to the provisioning and de-provisioning of identities and access via defined Role-based Access Control (RBAC) framework.
Upon completion of this course students will have an understanding of this process flow and the configuration required from an implementation perspective.
Est Duration: 45 mins
Fischer Identity's Help Desk Capability
This course will provide a review of the Fischer Identity Help Desk Capability.
This review will focus on the capabilities that can be configured to allow designated Identity users limited administrative access without the need to specifically grant privileges on target applications themselves.
Est Duration: 30 mins
Fischer Identity's - HPAM Feature Overview
This course will provide an overview of the Fischer Identity High Privileged Account Management (HPAM) feature.
It is through this feature that organizations can secure and provide elevated access as needed to the appropriate administrators. This access is then provided for the period of time needed to perform the desired administrative actions and then removed and secured against unauthorized use.
Upon completion of this course students will understand this capability and how to configure it to meet the fundamental HPAM requirements as dictated by customers business and regulatory requirements.
Est Duration: 1 hr 30 mins