This curriculum spans the breadth of authentication practices found in multi-workshop technical programs for enterprise identity teams, addressing real-world challenges such as hybrid environment modernization, zero-trust implementation, regulatory alignment, and cross-system interoperability.
Module 1: Foundational Authentication Concepts and Threat Landscape
- Selecting appropriate authentication factors based on risk profiles for workforce, customer, and partner access scenarios.
- Mapping authentication mechanisms to the MITRE ATT&CK framework to identify coverage gaps against common adversary techniques.
- Evaluating the security implications of legacy protocols (e.g., NTLM, LDAP bind) in hybrid environments during modernization planning.
- Defining authentication assurance levels (AAL) in alignment with NIST 800-63-3 for regulatory compliance and audit readiness.
- Assessing the operational impact of disabling password-based fallbacks when enforcing modern authentication across legacy applications.
- Documenting trust boundaries between identity providers, service providers, and relying parties in federated ecosystems.
Module 2: Password-Based Authentication and Lifecycle Management
- Configuring password complexity policies that balance usability with resistance to credential stuffing and brute-force attacks.
- Implementing secure password change and reset workflows that prevent escalation via self-service channels.
- Integrating password vaults or credential managers with enterprise directories to reduce credential reuse across systems.
- Deploying and tuning password screening tools using known-bad password lists (e.g., Azure AD Password Protection).
- Managing password synchronization across on-premises Active Directory and cloud directories in hybrid identity models.
- Enforcing time-bound password expiration only where mandated by regulation, based on current NIST guidance.
Module 3: Multi-Factor and Adaptive Authentication
- Choosing between push notifications, TOTP, FIDO2 security keys, and biometrics based on device ownership and threat model.
- Configuring conditional access policies to require step-up authentication for high-risk transactions or sensitive data access.
- Calibrating risk-based authentication engines to minimize false positives while detecting anomalous sign-in behaviors.
- Integrating fraud detection signals (e.g., IP reputation, device fingerprinting) into adaptive authentication decision logic.
- Designing fallback mechanisms for MFA that do not degrade security (e.g., avoiding SMS in high-risk environments).
- Managing user registration and recovery workflows for MFA methods without introducing helpdesk dependency.
Module 4: Certificate-Based and Machine Authentication
- Deploying client certificate authentication for service-to-service communication in zero-trust network architectures.
- Integrating enterprise PKI with identity providers to support smart card and PIV authentication for federal use cases.
- Automating certificate lifecycle management (issuance, renewal, revocation) for IoT and server workloads at scale.
- Configuring mutual TLS (mTLS) between microservices using short-lived certificates issued by a certificate authority.
- Mapping machine identities to service accounts in IAM policies to enforce least privilege for non-human entities.
- Enforcing certificate revocation checking (OCSP, CRL) in high-assurance environments despite latency and availability trade-offs.
Module 5: Federated Identity and SSO Protocols
- Selecting between SAML 2.0, OpenID Connect, and OAuth 2.1 based on application type, ecosystem, and security requirements.
- Configuring identity provider-initiated vs. service provider-initiated SSO for partner integrations.
- Managing cryptographic key rotation for SAML signing certificates across multiple relying parties.
- Implementing Just-In-Time (JIT) provisioning in federated scenarios while maintaining audit trail integrity.
- Negotiating and enforcing authentication context classes (e.g., MFA required) in SAML assertions and OIDC claims.
- Monitoring and responding to federation metadata changes from external partners to prevent trust hijacking.
Module 6: Passwordless and Phishing-Resistant Authentication
- Planning phased rollout of FIDO2 security keys across desktop and mobile platforms with endpoint management integration.
- Configuring Windows Hello for Business in hybrid Azure AD environments with on-premises key trust models.
- Validating phishing resistance by testing authenticator behavior under malicious redirect and subdomain attacks.
- Managing recovery paths for lost or damaged passwordless authenticators without reverting to passwords.
- Enabling passkeys for customer identity use cases with cross-platform sync considerations (Apple, Google, Microsoft).
- Assessing biometric data storage models (on-device vs. centralized) for compliance with privacy regulations (e.g., GDPR, BIPA).
Module 7: Authentication Governance, Monitoring, and Forensics
- Establishing audit logging requirements for authentication events across cloud and on-premises systems.
- Correlating sign-in logs from multiple identity providers to detect lateral movement and credential misuse.
- Defining retention policies for authentication logs in alignment with legal hold and compliance obligations.
- Implementing privileged access workstations (PAWs) and Just-In-Time (JIT) elevation for administrative authentication.
- Conducting regular access reviews that include authentication method strength and risk posture.
- Responding to authentication-related security incidents using playbooks that isolate compromised identities and rotate secrets.
Module 8: Integration and Interoperability Challenges
- Resolving protocol mismatches when integrating legacy applications with modern identity providers using reverse proxies.
- Mapping external identity claims to internal roles and attributes in multi-tenant SaaS applications.
- Handling session interoperability between web, mobile, and native applications using refresh token strategies.
- Integrating third-party identity verification services (e.g., government ID checks) into customer registration flows.
- Managing consent frameworks for delegated authentication in ecosystems with multiple data controllers.
- Testing failover behavior of authentication systems during identity provider outages or network partitions.