Access Manager Adv. Access Control

Access Manager Adv. Access Control Courses:

FIDO2 support in IBM Access Manager 9.0.7

Password re-use by users and password phishing create security breach concerns.  The FIDO Alliance promotes and delivers authentication standards that reduce the reliance on passwords.  This video demonstrates how to use FIDO2 authenticators with IBM Access Manager 9.0.7.

User Self-Care in Access Manager

In this course, you will learn about the three user self-care flows in IBM Access Manager with the Advanced Access Control add-on: forgotten username, forgotten password, self-registration. 

Leveraging JSON web tokens in IBM Security Access Manager
NEW

In this IBM Security Access Manager (ISAM) webinar replay, you learn about leveraging OIDC mapping rules to enhance JSON Web Tokens (JWT), using SSO Junctions to send JWT to junction applications, and accepting JWT as an authentication token in the Reverse Proxy.

Configuring silent and consent-based device registrations using one-time password (OTP)

IBM Access Manager supports device fingerprinting to allow tracking of a user across multiple devices and browsers.
This lab provides steps to configure Advanced Access Control policies to register a client device or browser using one-time password (OTP) sent to a user's email address.
The user is allowed access once OTP verification is complete.
The lab demonstrates silent and consent-based device registrations. It also covers how administrators and end users can manage device fingerprints.

Version 1.0

Duration: 1 hour 30 minutes

IRLP code: SEC9753

Accessing SCIM REST APIs using Curl and Postman

This course demonstrates how to call the Access Manager SCIM REST APIs using Basic Authentication and OAuth 2 Authentication. In this course, you first download and review the reference SCIM API documentation. Then, you configure the Reverse Proxy for API access using Basic authentication and also using the OAuth access tokens. Finally, you call the API using the Curl and the Postman utilities.

Access Manager: What's in the box? InfoMap Authentication Mechanism

In this Open Mic, a panel of IBM experts discuss how to properly configure and troubleshoot the InfoMap Authentication Mechanism within the IBM Security Access Manager appliance.

Context-based access transactions using FORM (POST) parameters

In this lab, you learn how to implement context-based access (CBA) using FORM (POST) parameters. You configure an access policy that detects high-value transactions based on a certain POST parameter in a web form and prompts for step-up authentication. The step-up authentication requires the users to provide a counter-based HMAC one-time password (HOTP).

You generate the OTP either using the OTP Generator demo application provided in the lab or by using a mobile app on your phone, for example, IBM Verify or Google Authenticator.

Context-based access transactions using REST (JSON) parameters

In this lab, you learn how to implement context-based access for a mobile application using REST (JSON) parameters. You configure an access policy that detects high-value transactions using a certain attribute in the JSON payload and prompts for step-up authentication. The step-up authentication requires the users to provide a time-based one-time password (TOTP).
You generate the OTP either using the OTP Generator demo application provided in the lab or by using a mobile app on your phone, for example, IBM Verify or Google Authenticator.

Securing APIs using OAuth authorization code, implicit and ROPC grant flows

This lab covers the following three main OAuth 2.0 workflows supported by IBM Access Manager: Authorization code, Implicit grant, and Resource owner password credentials (ROPC).

Configuring And Using OAuth Token Introspection Endpoint

IBM Access Manager provides OAuth 2.0 token introspection endpoint to support functions specified in RFC7662. The OAuth clients can use this endpoint to query the OAuth authorization server and request details about the access tokens issued by the server. For example, determining if the token is still active or accessing additional information about the token.
This lab demonstrates how to configure and use the OAuth 2.0 token introspection endpoint.

Using JSON Web Tokens (JWT) As OAuth Access Tokens

In this lab, you configure IBM Access Manager to generate and use JSON Web Tokens (JWTs) as OAuth Access Tokens rather than the standard opaque random string tokens that the OAuth server uses by default. JWTs are self-contained strings signed with a secret key. They contain a set of claims that assert an identity and a scope of access, reducing the need to go back and forth to the OAuth server to retrieve this information.

Setting up One time password using AAC - Open Mic

IBM Access Manager also known as IBM Security Access Manager V9 provides an add-on module for Advanced Access Control (AAC). In this Open Mic organized by Access Manager support team, they give an overview of the One time password (OTP) feature available in the AAC module. It is also demonstrated how to configure and use this feature. After the presentation, attendees were given an opportunity to ask the panel of experts questions.

Enabling and configuring the demo application
NEW

IBM Security Access Manager (ISAM) has a built-in demo application that is useful to demonstrate advanced authentication and authorization scenarios. You can also use this application to access information such as ISAM credential and session attributes, HTTP headers, and location attributes useful to diagnose setup problems.

This video course demonstrates the steps to enable and configure the demo application.

IBM Access Manager Advanced Authentication

Within Access Manager appliances, there is an authentication service with a number of authentication mechanisms.  In this video, you will learn about the authentication service, provided authentication mechanisms, and custom authentication.

Activating and configuring Advanced Access Control (AAC) module
NEW

The Advanced Access Control (AAC) functionality of IBM Security Access Manager (ISAM) is not enabled by default. The AAC module must be purchased and activated to enable this functionality. This lab provides procedures to activate and configure the Advanced Access Control module.

New frontiers of user authentication: Risk-based, passwordless, and decentralized identity

In this Think 2019 session replay, Shane Weeden and Nick Lloyd discuss the future of strong authentication, including Risk-based, passwordless, and decentralized identity mechanisms.

Configuring and using the SCIM interface

IBM Security Access Manager (ISAM) provides SCIM-based web services for user and group management. In this course, you use the SCIM Configuration page in the Access Manager Local Management Interface (LMI) to configure the SCIM capabilities. Then, you secure the SCIM endpoints using a Reverse Proxy. You also enable the built-in SCIM demonstration application that uses SCIM calls for user management.