title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.
Verify: Adoption
Course Description
Overview
This course guides learners through the process of adopting IBM Verify in their organization. It covers the Verify architecture, integration with existing deployments, user import from existing sources, and strategies for migrating and securing legacy applications.
Objectives
In this course, you learn to do the following tasks:
- Identify Verify core capabilities
- Describe methods of extending Verify and use cases
- Configure a Verify tenant
- Create an API client
- Describe aspects of the CSV import API
- Explain password considerations
- Distinguish between a reverse proxy and federation integration
Audience
IT personnel
Systems administrator
IT security architect
IT security deployment specialist
Topics
Verify architecture and sizing
This unit introduces the architecture, core features, and extensibility of IBM Verify. It covers key capabilities such as single sign-on (SSO), multi-factor authentication (MFA), adaptive access, governance, and branding. Verify scales dynamically and integrates with on-premises systems via bridges and gateways for authentication, directory sync, provisioning, and application modernization. It supports hybrid environments, risk-based access, and a wide range of deployment scenarios, enabling secure, centralized identity management across cloud and legacy systems.
The B Insurance Group case study
This case study follows B Insurance Group (BIG) as it modernizes and consolidates identity and access management across three divisions using IBM Verify. Initially, each division operates independently with separate user directories and branding, resulting in high operational overhead, inconsistent user experiences, and challenges implementing unified security controls, such as multi-factor authentication (MFA). This case study showcases a structured, phased approach to IAM modernization that balances technical, operational, and user experience priorities.
Migrating users with CSV import API
This unit introduces the various migration methods available in Verify, describes Verify Cloud Directory, and dives deeper into the use of the CSV import API to migrate users. By the end, you'll have a solid understanding of how to efficiently and securely import users into Verify.
Application migrationThis unit covers application migration and integration with Verify and explains considerations and methods for ensuring a successful migration. Application roles in IAM and the difference between a reverse proxy and federation integration are also explored.
Related Courses
-
Verify Access: Deploy and Configure
TW110G- Duration: 9 Hours
- Delivery Format: Classroom Training, Online Training
- Price: 1,790.00 USD
-
Verify Access: PoPs, ACLs, and Junctions
TW111G- Duration: 9 Hours
- Delivery Format: Classroom Training, Online Training
- Price: 1,790.00 USD
Self-Paced Training Info
Learn at your own pace with anytime, anywhere training
- Same in-demand topics as instructor-led public and private classes.
- Standalone learning or supplemental reinforcement.
- e-Learning content varies by course and technology.
- View the Self-Paced version of this outline and what is included in the SPVC course.
- Learn more about e-Learning
Course Added To Shopping Cart
bla
bla
bla
bla
bla
bla
Self-Paced Training Terms & Conditions
Exam Terms & Conditions
Sorry, there are no classes that meet your criteria.
Please contact us to schedule a class.

STOP! Before You Leave
Save 0% on this course!
Take advantage of our online-only offer & save 0% on any course !
Promo Code skip0 will be applied to your registration
Purchase Information
title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.




