course

Home / Courses / TW108G IBM Security Verify Access Foundations

Course Objectives

Describe IBM Security Verify Access product and its key features Discuss the architecture and deployment process Configure IBM Security Verify Access users, groups, and domains Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure Describe protected object space and the policy access control model Explain how to set up reverse proxy junctions to handle web requests Discuss and configure authentication mechanisms that are supported by Verify Access Explain and set up logging, auditing, and tracing for Verify Access components

Agenda

  • Introduction to IBM Security Verify Access

  • Architecture and deployment

  • Managing users, groups, and domains

  • Reverse Proxy (WebSEAL) concepts

  • Managing access control

  • Configuring junctions for back-end resources

  • Authentication framework and methods

  • Logging, auditing, and tracing
Tags
Technical Vendor: Exit Certified Product Line: Other Technical Core Type: Core 0
FREE

Interested in course?


Course Type: Instructor Led