Authenticating and Securing User Access to Citrix ADC
This course will teach you how to securely control user access to Citrix ADC, focusing on SSO authentication including SAML. Plus, learn about other security features such as authorization, auditing, admin partitions, and Smart Control/SmartAccess.
What you'll learn
Enterprise users demand quick and easy access, but hackers are constantly trying to attack system resources. Citrix Application Delivery Controller is a robust solution that offers a myriad of features and options so that you can securely allow your users the access they need.
In this course, Securing User Access to Citrix ADC, you’ll learn the how to enable and control secure user access to Citrix ADC.
First, you’ll explore administrative access and general security.
Next, you’ll delve into the first A in AAA, i.e., Authentication, which includes single sign-on via SAML and other authentication options.
Further, we’ll explore Authorization and Auditing will be explored.
Finally, you’ll learn about SmartControl/Smart/Access features.
When you’re finished with this course, you’ll have the skills and knowledge to make decisions related to secure user access via Citrix ADC, as well as implementation.
Table of contents
Course FAQ
Citrix ADC is used to accelerate application performance, enhance application availibility with L4-7 load balancing, secure mission-critical apps from attacks, and lower server expenses.
Some benefits of Citrix ADC are the flexibility, simplicity, and advanced economics of the controller.
In this course, you will learn how to secure Citrix ADC from administrator perspective, Understand authentication options, Control authorization and auditing, and Enable SmartControl and SmartAccess. By the end of this course, you will understand Authentication, Authorization, and Auditing (AAA).
SSO authentication stands for: Single sign-on. This allows for a user to log in with a single ID and password.
Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties. Specifically, between an identity provider and service provider.