Verify Access: Deploy and Configure [TDS_TW110G]

Durée totale
Localisation
A cet endroit
Date et lieu de début

Verify Access: Deploy and Configure [TDS_TW110G]

Global Knowledge Belgium BV
Logo Global Knowledge Belgium BV
Note du fournisseur: starstarstar_halfstar_borderstar_border 4,5 Global Knowledge Belgium BV a une moyenne de 4,5 (basée sur 2 avis)

Astuce: besoin de plus d'informations sur la formation? Téléchargez la brochure!

Dates et lieux de début
placeVirtual Training Centre
19 jan. 2026
placeVirtual Training Centre
16 mar. 2026
Description

Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.

OVERVIEW

In this course, you learn about the IBM Security® Verify Access architecture and deployment options and how to position the product within your organization’s landscape of security solutions. You gain skills around how to deploy Verify Access in a containerized environment or on a virtual machine.

First, you improve your Verify Access administration skills by managing users, groups, and domains. Then, you set up the WebSEAL reverse proxy, including the configuration of authentication and authorization processes, protecting the object space with junctions. You also learn about other administration tasks.

Virtual Learning

This interactive training can be taken from any location, yo…

Lisez la description complète ici

Foire aux questions (FAQ)

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Vous n'avez pas trouvé ce que vous cherchiez ? Voir aussi : Microsoft Access, Data privacy, Data management, Perte de poids et Nutrition.

Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.

OVERVIEW

In this course, you learn about the IBM Security® Verify Access architecture and deployment options and how to position the product within your organization’s landscape of security solutions. You gain skills around how to deploy Verify Access in a containerized environment or on a virtual machine.

First, you improve your Verify Access administration skills by managing users, groups, and domains. Then, you set up the WebSEAL reverse proxy, including the configuration of authentication and authorization processes, protecting the object space with junctions. You also learn about other administration tasks.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

OBJECTIVES

In this course, you learn to do the following tasks:

  • Explain the business context for identity and access management as well as the features and functions of IBM Security Verify Access
  • Describe the component architecture
  • Explain the deployment options
  • Install and configure Verify Access in a containerized environment
  • Understand the differences between a virtual machine or containerized deployment
  • Describe the role of the Verify Access administrator
  • Learn how to manage user, groups, and domains
  • Explain the reverse proxy concepts and capabilities:

- Understand the concept and capabilities

- Describe the authentication and authorization processes

- Explain the protected object space and how to use junctions

- Learn about administrative tasks

AUDIENCE

IT personnel

System administrator

IT Security Architect

IT Security Deployment Specialist

CONTENT

IBM Security Verify Access introduction

  • Understand the business context for identity and access management
  • Discuss the features and functions of IBM Security Verify Access

Architecture and deployment

  • Describe the components
  • Understand the deployment options
  • Install and configure Verify Access in a containerized environment
  • Understand the differences between a virtual machine or containerized deployment

User, group, and domain configuration

  • Describe the role of the Verify Access administrator
  • Learn how to manage user, groups, and domains

Reverse proxy concepts

  • Understand the concept and capabilities
  • Describe the authentication and authorization processes
  • Explain the protected object space and how to use junctions
  • Learn about administrative tasks
Rester à jour sur les nouveaux avi
Pas encore d'avis.
Partagez vos avis
Avez-vous participé à cours? Partagez votre expérience et aider d'autres personnes à faire le bon choix. Pour vous remercier, nous donnerons 1,00 € à la fondation Stichting Edukans.

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Recevoir une brochure d'information (gratuit)

(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)

Vous avez des questions?

(optionnel)
Nous conservons vos données personnelles dans le but de vous accompagner par email ou téléphone.
Vous pouvez trouver plus d'informations sur : Politique de confidentialité.