Skip to main Content

Verify Access: Deploy and Configure

  • Code training TW110G
  • Duur 2 dagen

Andere trainingsmethoden

Virtueel leren Prijs

eur850.00

(excl. BTW)

Vraag een groepstraining aan Schrijf je in

Methode

Deze training is in de volgende formats beschikbaar:

  • Klassikale training

    Klassikaal leren

  • Virtueel leren

    Virtueel leren

Vraag deze training aan in een andere lesvorm.

Trainingsbeschrijving

Naar boven

In this course, you learn about the IBM Security® Verify Access architecture and deployment options and how to position the product within your organization’s landscape of security solutions. You gain skills around how to deploy Verify Access in a containerized environment or on a virtual machine.

First, you improve your Verify Access administration skills by managing users, groups, and domains. Then, you set up the WebSEAL reverse proxy, including the configuration of authentication and authorization processes, protecting the object space with junctions. You also learn about other administration tasks.

Virtueel en Klassikaal™

Virtueel en Klassikaal™ is een eenvoudig leerconcept en biedt een flexibele oplossing voor het volgen van een klassikale training. Met Virtueel en Klassikaal™ kunt u zelf beslissen of u een klassikale training virtueel (vanuit huis of kantoor )of fysiek op locatie wilt volgen. De keuze is aan u! Cursisten die virtueel deelnemen aan de training ontvangen voor aanvang van de training alle benodigde informatie om de training te kunnen volgen.

    • Methode: Virtueel leren
    • Datum: 19 januari, 2026 | 09:00 to 17:00
    • Locatie: Virtueel-en-klassikaal (W. Europe )
    • Taal: Engels

    eur850.00

    • Methode: Virtueel leren
    • Datum: 16 maart, 2026 | 09:00 to 17:00
    • Locatie: Virtueel-en-klassikaal (W. Europe )
    • Taal: Engels

    eur850.00

Doelgroep

Naar boven

IT personnel

System administrator

IT Security Architect

IT Security Deployment Specialist

Trainingsdoelstellingen

Naar boven

In this course, you learn to do the following tasks:

  • Explain the business context for identity and access management as well as the features and functions of IBM Security Verify Access
  • Describe the component architecture
  • Explain the deployment options
  • Install and configure Verify Access in a containerized environment
  • Understand the differences between a virtual machine or containerized deployment
  • Describe the role of the Verify Access administrator
  • Learn how to manage user, groups, and domains
  • Explain the reverse proxy concepts and capabilities:

- Understand the concept and capabilities

- Describe the authentication and authorization processes

- Explain the protected object space and how to use junctions

- Learn about administrative tasks

Inhoud training

Naar boven

IBM Security Verify Access introduction

  • Understand the business context for identity and access management
  • Discuss the features and functions of IBM Security Verify Access

Architecture and deployment

  • Describe the components
  • Understand the deployment options
  • Install and configure Verify Access in a containerized environment
  • Understand the differences between a virtual machine or containerized deployment

User, group, and domain configuration

  • Describe the role of the Verify Access administrator
  • Learn how to manage user, groups, and domains

Reverse proxy concepts

  • Understand the concept and capabilities
  • Describe the authentication and authorization processes
  • Explain the protected object space and how to use junctions
  • Learn about administrative tasks