BMC AMI Enterprise Connector for Venafi 2.x: Fundamentals Using (WBT)
Most people have tried to access a website and instead received a warning message advising caution because the site’s trust certificate has expired. For major enterprises with tens of thousands of servers and endpoints, managing certificates and ensuring they remain valid to avoid application outages is a huge undertaking. If certificates aren’t implemented properly, applications simply stop.
BMC offers an integration with Venafi, a leading provider of machine identity protection, to automate certificate management and access control for the mainframe. Venafi’s Trust Protection Platform (TPP) further contributes to your enterprise-wide Zero Trust security stance by ensuring connections to the mainframe are continuously verified and monitored and your policies enforced.
In this course, the learners will understand how BMC integrates with Venafi. They will learn how the product is installed, configured, and administered through engaging web-based content and quizzes.
Major release:
BMC AMI Security 2.x
Good for:
Administrators, Users
Course Delivery:
Web Based Training (WBT) | 3 horas
Course Modules
-
Introduction to BMC AMI EC for Venafi
- Identify the key functions of Venafi
- Identify the benefits of integrating BMC AMI EC with Venafi
- Identify the components of BMC AMI EC for Venafi
- Differentiate between the types of TPP transactions processed by BMC AMI EC for Venafi
- Discuss the key features of BMC AMI EC for Venafi
-
Installing BMC AMI EC for Venafi
- Discuss the tasks that need to be performed before installing BMC AMI EC for Venafi
- Identify the tasks performed while installing BMC AMI EC for Venafi
- Perform the procedure of installing the TPP adaptable driver and bulk insert utility
-
Configuring BMC AMI EC forVenafi
- Identify the statements you need to configure the gateway
- Identify the statements you need to configure to set up the agent
- Describe the tasks to be performed to configure the Bulk Insert Utility
- Describe the post-implementation script requirements
- Configure the post-implementation script
-
Using BMC AMI EC for Venafi
- Discuss certificate discovery
- Explain the prerequisites, exceptions, and naming conventions for certificate discovery
- Identify the key ring and LPAR ordering conventions
- Identify scenarios when a certificate can be a site certificate
- Explain the actions taken by EC for Venafi when a certificate has its private key in ICSF
- Log on to the web browser interface of EC for Venafi
- Perform various Tasks using the interface elements of EC for Venafi
-
Administering BMC AMI EC for Venafi
- Explain the need to set ESM profiles
- Identify permissions required by the EC for Venafi gateway, agent, and User ID
- Set required ESM profiles
- Differentiate between the access types for ESM profiles
- Use the commands to start and stop BMC AMI EC for Venafi
- Identify the variables used in the Bulk Insert utility and the actions it performs
- Identify the BMC AMI EC for Venafi unique commands
- Identify the three commands that are used exclusively by BMC AMI EC for Venafi