Access Manager - Latest
Access Manager - Latest Courses:
IBM Access Manager Platform protects web resources using security policies. Each security policy can be defined with a combination of the following controls: Access Control List (ACL) policies, Protected Object Policies (POPs) and Authorization rules.
In this lab, you use ACLs, POPs, and authorization rules to control access to the web content. You first create a junction for IBM HTTP Server (IHS) resources. Then, you apply various security policies to the web resources protected by that junction.
lab demonstrates how to set up the OpenID Connect federation using IBM
Security Access Manager (ISAM) 9.0.7. The lab provides two Access Manager appliances: isam1 and isam2.
The isam1 appliance is used as an OpenID Connect Provider (OP) and the
isam2 appliance acts as a Relying Party (RP). The live mobile demo
application running on the Relying party appliance is used for verifying
the federation capabilities.
In this lab, you will build the reverse proxy junctions and use various options to pass identity information through headers.
IBM Security Access Manager (ISAM) provides a Federation module so that
collaborating organizations can gain secure access to each other's
applications. The Federation module supports SAML 2.0 federations.
This course provides a lab setup and step-by-step instructions on
how to set up the SAML 2.0 federation using IBM Security Access Manager
V9.0.7. The lab provides two SAM appliances: isam1 and isam2. The isam1
appliance is used as a SAML Identity Provider
(IdP) and the isam2 appliance acts as a SAML Service Provider (SP). The
built-in demo application running on the Service Provider appliance is
used for verifying federation capabilities.
This guide provides step-by-step guidance to configure User Self-Care using the IBM Security Access Manager Advanced Access Control add-on. The first set of exercises show how to configure the standard out-of- the-box functionality. Further exercises show how User Self-Care can be customized by modifying the provided script files and page templates, and how new functionality can be added.
In this IBM Security Access Manager (ISAM) webinar replay, you learn about leveraging OIDC
mapping rules to enhance JSON Web Tokens (JWT), using SSO Junctions to
send JWT to junction applications, and accepting JWT as an
authentication token in the Reverse Proxy.
This lab provides a brief introduction to IBM Security Access Manager (ISAM) V9 Platform
administration. You learn how to configure and use the IBM Security Access
Manager V9.0.3 Platform module for web access management.
IBM Security Access Manager (ISAM) has a built-in demo application
that is useful to demonstrate advanced authentication and authorization
scenarios. You can also use this application to access information such
as ISAM credential and session attributes, HTTP headers, and location
attributes useful to diagnose setup problems.
This video course demonstrates the steps to enable and configure the demo application.