Access Manager Base

Access Manager Base Courses:

Configuring basic users using Active Directory as a federated directory

In this lab, you set up an Active Directory as a Federated directory. Then, you configure the Active Directory users as Basic users in Access Manager.

Access Manager REST Client Enhancements

In this video, you will see a demo of the REST client enhancements in IBM Access Manager 9.0.6.

Access Manager base functions

This course covers the base functions of IBM Access Manager, including these topics:

  • Base components
  • Junctions
  • Management
  • Activation files and licenses
  • Updates
  • Configuration snapshots
  • Support file
  • Auditing
  • Monitoring
  • High availability

What's new in Access Manager 9.0.7

In this Open Mic, Scott Exton and Shane Weeden provided an overview of what is new in IBM Security Access Manager 9.0.7. Major themes include:

  • FIDO2 support
  • Simplified API support
  • Quality and customer RFEs
  • Certifications
  • Upgrade and deployment improvements

Kerberos Single Sign-On with IBM Access Manager

In this video, you will learn how you can set up federated directories to connect to your Active Directory, then enable native Kerberos Single Sign-On to allow IBM Access Manager to single sign on to Microsoft® systems.

ISAM Adapter for ISIM and IGI

In this Open Mic from 26 June 2019, you learn how to use and troubleshoot the IBM Security Access Manager Adapter (also known as the ISAM Combo Adapter) with the latest level of IBM Security Identity Manager (ISIM) and IBM Security Identity Governance and Intelligence (IGI).

Access Manager Rate Limiting

In this video, you will see a demo of the new rate limiting feature in IBM Access Manager 9.0.6.

IBM Access Manager Platform Foundations

This is a commercial course that is available through our training partners. Please follow the link below to enroll in this course.

This is a three-days instructor-led course that introduces students to the foundational skills required to install, configure, and administer IBM Access Manager platform module.
Students learn these skills through lecture and intensive hands-on labs.

This course is designed for system administrators who are interested in learning IBM Access Manager.

Before taking this course, make sure that you have the following skills:

  • Familiarity with LDAP, TCP/IP and HTTP fundamentals
  • Familiarity with the Linux command-line
  • Basic knowledge of JavaScript
  • Working knowledge of security concepts, including SSL, authentication, and authorization
Click on this link to go to the IBM Training Website to find a training partner for this course. To enroll in the course, follow the "View enrollment options" link to the IBM Training site to find a class that matches your location and schedule needs.

IBM Access Manager Open Mic: HTTP Transformation Rules

This video discusses the HTTP transformation rules with IBM Access Manager. Topics covered include what are transformation rules, how they are configured, and, how to troubleshoot the rules. In addition, information on how to download example rules is included. 

How to create a reverse proxy instance in IBM Security Access Manager 9

This video demonstrates how to create a reverse proxy instance in IBM Security Access Manager version 9.

Configuring different types of junctions and passing identity attributes to backend resources

In this lab, you will build the reverse proxy junctions and use various options to pass identity information through headers.

Securing web resources using ACL, POP and Authorization rule policies

IBM Access Manager Platform protects web resources using security policies. Each security policy can be defined with a combination of the following controls: Access Control List (ACL) policies, Protected Object Policies (POPs) and Authorization rules.

In this lab, you use ACLs, POPs, and authorization rules to control access to the web content. You first create a junction for IBM HTTP Server (IHS) resources. Then, you apply various security policies to the web resources protected by that junction.

Configuring HTTP transformation feature

In this lab, you configure HTTP transformation rules to modify HTTP requests and responses passing through the reverse proxy junctions.

ISAM Open Mic ISAM Orchestration

In this session presented live at Think 2018, we review the framework built to leverage IBM Security Access Manager (ISAM) REST APIs using Python/Ansible to fully automate all changes to ISAM. This provides an overview for new customers and assists those who are already leveraging this approach.

IBM Security Access Manager Introduction

This video provides an introduction to IBM Security Access Manager, including portfolio strategy, access management use cases, and packaging.

Configuring client certificate and step-up authentication

This lab covers how to use the user certificates issued by a trusted authority for the client certificate authentication. It also demonstrates step-up authentication using client certificate as a second level of authentication.

Configuring SSO to WebSphere Liberty using LTPA token

This lab provides a sample configuration that enables Liberty application to authenticate and authorize against the Access Manager LDAP user registry using an LTPA cookie.

Configuring External Authentication Interface (EAI)

This lab demonstrates steps to configure the Access Manager reverse proxy to redirect the authentication process to an EAI application.

Debugging SSL Junction Failures

In this Open Mic, a panel of experts discuss how to properly debug IBM Security Access Manager WebSEAL SSL Junction failures with Wireshark.

Quick Start to Protecting a Web Application using ISAM

This short video demonstrates how to secure a Web application using the Web Reverse Proxy component of IBM Security Access Manager.

Configuring and using Access Manager V9 Platform

This lab provides a brief introduction to IBM Security Access Manager (ISAM) V9 Platform administration. You learn how to configure and use the IBM Security Access Manager V9.0.3 Platform module for web access management.

API Protection feature overview Open Mic

In this Open Mic organized by Access Manager support team, the team discuss how Access Manager protects APIs using OAuth protocol. Some of the key topics include OAuth overview, OAuth terminology, OAuth roles, grant types, enabling OAuth authentication, API protection configuration, authentication code flow, Implicit flow, OAuth mapping rules. After the presentation, attendees were given an opportunity to ask the panel of experts questions.