title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.
Verify Access: Administration
Course Description
Overview
In this course, you learn about the IBM Verify Access architecture and deployment options and how to position the product within your organization's landscape of security solutions. You gain skills around how to deploy Verify Access in a containerized environment or on a virtual machine. First, you improve your Verify Access administration skills by managing users, groups, and domains. Then, you are setting up the Reverse Proxy, including the configuration of authentication and authorization processes, protecting the object space with junctions. This course also provides a solid foundation around setting up logging and auditing, preparing you to successfully manage troubleshooting scenarios.
Objectives
In this course, you learn to do the following tasks:
- Explain the business context for access management as well as the features and functions of Verify Access
- Describe the component architecture
- Explain the deployment options
- Install and configure Verify Access in a containerized environment
- Understand the differences between a virtual machine or containerized deployment
- Describe the role of the Verify Access administrator
- Learn how to manage user, groups, and domains
- Explain the Reverse Proxy concepts and capabilities:
- Describe how to control access to the protected objects by using Access Control List (ACL) policies, Protected Object Policies (POP), and Authorization rules
- Understand the concept of context-based access
- Describe the Reverse Proxy junctions
- Explain the basic concepts of Verify Access authentication
- Describe the core set of authentication methods that are supported by the Reverse Proxy
- Discuss supplemental post-authentication processes
- Describe the Verify Access logging framework in a containerized deployment
- Describe Verify Access auditing capabilities
- Explain how to troubleshoot the deployment
Audience
IT Personnel, System Administrator, IT Security Architect, IT Security Deployment Specialist
Topics
Architecture and deployment
- Describe the components
- Understand the deployment options
- Install and configure Verify Access in a containerized environment
- Install and configure Verify Access in a containerized environment
User, group, and domain configuration
- Describe the role of the Verify Access administrator
- Learn how to manage user, groups, and domains
Reverse proxy concepts
- Understand the concept and capabilities
- Describe the authentication and authorization processes
- Explain the protected object space and how to use junctions- Learn about administrative tasks
Managing access control
- Explain the object space and the protected objects concept
- Control access to the protected objects by using Access Control List (ACL) policies
- Describe and configure Protected Object Policies (POP)
- Describe and configure Authorization rules
Reverse Proxy junctions
- Describe and configure standard junctions
- Provide an overview of the URL modification methods supported by the Reverse Proxy
- Describe and configure virtual host junctions
Authentication framework and methods
- Explain the basic concepts of Verify Access authentication
- Describe the core set of authentication methods that are supported by the Reverse Proxy
- Discuss supplemental post-authentication processes
- Describe the password processing policy options available during the Reverse Proxy authentication
Logging, auditing, and troubleshooting
- Describe the Verify Access logging framework (containerized deployment)
- Describe Verify Access auditing capabilities
- Explain how to troubleshoot the deployment and collect the support files for problem determination
Related Courses
-
Verify Access: Deploy and Configure
TW110G- Duration: 9 Hours
- Delivery Format: Classroom Training, Online Training
- Price: 1,790.00 USD
-
Verify Access: PoPs, ACLs, and Junctions
TW111G- Duration: 9 Hours
- Delivery Format: Classroom Training, Online Training
- Price: 1,790.00 USD
Self-Paced Training Info
Learn at your own pace with anytime, anywhere training
- Same in-demand topics as instructor-led public and private classes.
- Standalone learning or supplemental reinforcement.
- e-Learning content varies by course and technology.
- View the Self-Paced version of this outline and what is included in the SPVC course.
- Learn more about e-Learning
Course Added To Shopping Cart
bla
bla
bla
bla
bla
bla
Self-Paced Training Terms & Conditions
Exam Terms & Conditions
Sorry, there are no classes that meet your criteria.
Please contact us to schedule a class.

STOP! Before You Leave
Save 0% on this course!
Take advantage of our online-only offer & save 0% on any course !
Promo Code skip0 will be applied to your registration
Purchase Information
title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.




