Verify Access: Deploy and Configure
- Código del Curso TW110G
- Duración 2 días
Otros Métodos de Impartición
Método de Impartición
Este curso está disponible en los siguientes formatos:
-
Clase de calendario
Aprendizaje tradicional en el aula
-
Aprendizaje Virtual
Aprendizaje virtual
Solicitar este curso en un formato de entrega diferente.
Temario
Parte superiorIn this course, you learn about the IBM Security® Verify Access architecture and deployment options and how to position the product within your organization’s landscape of security solutions. You gain skills around how to deploy Verify Access in a containerized environment or on a virtual machine.
First, you improve your Verify Access administration skills by managing users, groups, and domains. Then, you set up the WebSEAL reverse proxy, including the configuration of authentication and authorization processes, protecting the object space with junctions. You also learn about other administration tasks.
Curso Remoto (Abierto)
Nuestra solución de formación remota o virtual, combina tecnologías de alta calidad y la experiencia de nuestros formadores, contenidos, ejercicios e interacción entre compañeros que estén atendiendo la formación, para garantizar una sesión formativa superior, independiente de la ubicación de los alumnos.
Calendario
Parte superiorDirigido a
Parte superiorIT personnel
System administrator
IT Security Architect
IT Security Deployment Specialist
Objetivos del Curso
Parte superiorIn this course, you learn to do the following tasks:
- Explain the business context for identity and access management as well as the features and functions of IBM Security Verify Access
- Describe the component architecture
- Explain the deployment options
- Install and configure Verify Access in a containerized environment
- Understand the differences between a virtual machine or containerized deployment
- Describe the role of the Verify Access administrator
- Learn how to manage user, groups, and domains
- Explain the reverse proxy concepts and capabilities:
- Understand the concept and capabilities
- Describe the authentication and authorization processes
- Explain the protected object space and how to use junctions
- Learn about administrative tasks
Contenido
Parte superiorIBM Security Verify Access introduction
- Understand the business context for identity and access management
- Discuss the features and functions of IBM Security Verify Access
Architecture and deployment
- Describe the components
- Understand the deployment options
- Install and configure Verify Access in a containerized environment
- Understand the differences between a virtual machine or containerized deployment
User, group, and domain configuration
- Describe the role of the Verify Access administrator
- Learn how to manage user, groups, and domains
Reverse proxy concepts
- Understand the concept and capabilities
- Describe the authentication and authorization processes
- Explain the protected object space and how to use junctions
- Learn about administrative tasks