Access Manager Base
Access Manager Base Courses:
In this lab, you use ACLs, POPs, and authorization rules to control access to the web content.
THIS COURSE IS RETIRED!
Visit the following course for the updated version: Securing web resources using ACL, POP and Authorization rule policies https://www.securitylearningacademy.com/course/view.php?id=4498
In this lab, you will build the reverse proxy junctions and use various options to pass identity information through headers.
IBM Access Manager Platform protects web resources using security policies. Each security policy can be defined with a combination of the following controls: Access Control List (ACL) policies, Protected Object Policies (POPs) and Authorization rules.
In this lab, you use ACLs, POPs, and authorization rules to control access to the web content. You first create a junction for IBM HTTP Server (IHS) resources. Then, you apply various security policies to the web resources protected by that junction.
In this lab, you configure HTTP transformation rules to modify HTTP requests and responses passing through the reverse proxy junctions.
This lab covers how to use the user certificates issued by a trusted authority for the client certificate authentication. It also demonstrates step-up authentication using client certificate as a second level of authentication.
This lab provides a sample configuration that enables Liberty application to authenticate and authorize against the Access Manager LDAP user registry using an LTPA cookie.
This lab demonstrates steps to configure the Access
Manager reverse proxy to redirect the authentication process to an EAI
This lab provides a brief introduction to IBM Security Access Manager (ISAM) V9 Platform
administration. You learn how to configure and use the IBM Security Access
Manager V9.0.3 Platform module for web access management.