In this course, you learn about the IBM Security® Verify Access architecture and deployment options and how to position the product within your organization’s landscape of security solutions. You gain skills around how to deploy Verify Access in a containerized environment or on a virtual machine.
First, you improve your Verify Access administration skills by managing users, groups, and domains. Then, you set up the WebSEAL reverse proxy, including the configuration of authentication and authorization processes, protecting the object space with junctions. You also learn about other administration tasks.
IT personnel
System administrator
IT Security Architect
IT Security Deployment Specialist
In this course, you learn to do the following tasks:
- Understand the concept and capabilities
- Describe the authentication and authorization processes
- Explain the protected object space and how to use junctions
- Learn about administrative tasks
IBM Security Verify Access introduction
Architecture and deployment
User, group, and domain configuration
Reverse proxy concepts
Verify Access: Deploy and Configure
16.3.2026 Online ILO, Online, Online Online
anglicky