Publication date : 02/29/2024

Course : Authentication and authorization, architectures and solutions

Synthesis course - 2d - 14h00 - Ref. AAA
Price : 1720 € E.T.

Authentication and authorization, architectures and solutions




This course proposes a methodological approach to the successful implementation of triple A services: Authentication, Authorization, Accounting. Thanks to the case studies presented, you'll learn how to avoid classic problems and choose the most appropriate solution for your company's needs.


INTER
IN-HOUSE
CUSTOM

Synthesis course in person or remote class
Disponible en anglais, à la demande

Ref. AAA
  2d - 14h00
1720 € E.T.




This course proposes a methodological approach to the successful implementation of triple A services: Authentication, Authorization, Accounting. Thanks to the case studies presented, you'll learn how to avoid classic problems and choose the most appropriate solution for your company's needs.


Teaching objectives
At the end of the training, the participant will be able to:
Understanding the AAA concept: Authentication, Authorization, Accounting
Understand authentication and authorization mechanisms in different environments
Know the different encryption and cryptography techniques
Know how to use the various Authentication, Authorization and Accounting services
Identify the different tools on the market

Intended audience
Network architects and project managers. IT decision-makers, especially those in charge of technology or infrastructure.

Prerequisites
Basic knowledge of technical architectures.

Course schedule

1
Introduction

  • The AAA concept.
  • Services provided.
  • Market demand.

2
Environments

  • Microsoft authentication and authorization mechanisms.
  • Authentication and authorization in the Unix world.
  • Access methods to corporate networks.
  • How do you access applications?

3
Technology

  • Encryption techniques.
  • MD5, AES, RSA algorithms, etc.
  • Kerberos, Radius, PAM, LDAP infrastructures, etc.
  • Verification protocols such as WindBind, SASL, GSSAPI, etc.
  • APIs (JaaS...).
  • Defining authorizations. Groups and roles.
  • RBAC, PDP and PEP organization models.

4
Services and architectures

  • Strong authentication.
  • SSO and WebSSO single sign-on.
  • Centralize authentication.
  • Authentication/Authorization/Centralized attributes.
  • Password management.
  • Digital keys and certificates.
  • Authorizations.
  • Accounting and auditing.

5
Market products

  • An overview of Open Source solutions.
  • CAS, OpenSSO, tripleSec applications, etc.
  • Commercial products.
  • TAM, TIM, IDM, OAS software, etc.
  • Advantages and disadvantages.

6
Conclusions

  • Understanding needs.
  • Evaluate the most appropriate solution.
  • Tomorrow's solutions.


Customer reviews
4,3 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.
SÉBASTIEN P.
11/12/25
4 / 5

bon panorama
PHILIPPE-XAVIER G.
19/06/25
5 / 5

A passionate and interesting presenter.
FRÉDÉRIC V.
19/06/25
4 / 5

correct



Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class

Dernières places
Date garantie en présentiel ou à distance
Session garantie

REMOTE CLASS
2026 : 31 Mar., 11 June, 22 Sep., 10 Dec.

PARIS LA DÉFENSE
2026 : 31 Mar., 11 June, 22 Sep., 10 Dec.