Access Manager Adv. Access Control

Access Manager Adv. Access Control Courses:

Activating and configuring Advanced Access Control (AAC) module

The Advanced Access Control (AAC) functionality of IBM Security Access Manager (ISAM) is not enabled by default. The AAC module must be purchased and activated to enable this functionality. This lab provides procedures to activate and configure the Advanced Access Control module.

Configuring and using the SCIM interface

IBM Security Access Manager (ISAM) provides SCIM-based web services for user and group management. In this course, you use the SCIM Configuration page in the Access Manager Local Management Interface (LMI) to configure the SCIM capabilities. Then, you secure the SCIM endpoints using a Reverse Proxy. You also enable the built-in SCIM demonstration application that uses SCIM calls for user management.

Configuring silent and consent-based device registrations using one-time password
NEW

IBM Security Access Manager (ISAM) supports device fingerprinting to allow tracking of a user across multiple devices and browsers. This lab provides steps to configure Advanced Access Control (AAC) policies to register a client device or browser using one-time password (OTP) sent to a user's email address. The user is allowed access once OTP verification is complete. It also covers how administrators and end users can manage device fingerprints.

Context-based access transactions using REST (JSON) parameters

In this lab, you learn how to implement context-based access for a mobile application using REST (JSON) parameters. You configure an access policy that detects high-value transactions using a certain attribute in the JSON payload and prompts for step-up authentication. The step-up authentication requires the users to provide a time-based one-time password (TOTP).
You generate the OTP either using the OTP Generator demo application provided in the lab or by using a mobile app on your phone, for example, IBM Verify or Google Authenticator.

Securing APIs using OAuth authorization code, implicit and ROPC grant flows

This lab covers the following three main OAuth 2.0 workflows supported by IBM Access Manager: Authorization code, Implicit grant, and Resource owner password credentials (ROPC).