Access Manager - Latest

Access Manager - Latest Courses:

NEW

IBM Access Manager Platform protects web resources using security policies. Each security policy can be defined with a combination of the following controls: Access Control List (ACL) policies, Protected Object Policies (POPs) and Authorization rules.

In this lab, you use ACLs, POPs, and authorization rules to control access to the web content. You first create a junction for IBM HTTP Server (IHS) resources. Then, you apply various security policies to the web resources protected by that junction.

NEW

This lab demonstrates how to set up the OpenID Connect federation using IBM Security Access Manager (ISAM)  9.0.7. The lab provides two Access Manager appliances: isam1 and isam2. The isam1 appliance is used as an OpenID Connect Provider (OP) and the isam2 appliance acts as a Relying Party (RP). The live mobile demo application running on the Relying party appliance is used for verifying the federation capabilities.

NEW

In this lab, you will build the reverse proxy junctions and use various options to pass identity information through headers.

NEW

IBM Security Access Manager (ISAM) provides a Federation module so that collaborating organizations can gain secure access to each other's applications. The Federation module supports SAML 2.0 federations.

This course provides a lab setup and step-by-step instructions on how to set up the SAML 2.0 federation using IBM Security Access Manager V9.0.7. The lab provides two SAM appliances: isam1 and isam2. The isam1 appliance is used as a SAML Identity Provider (IdP) and the isam2 appliance acts as a SAML Service Provider (SP). The built-in demo application running on the Service Provider appliance is used for verifying federation capabilities.

NEW

This guide provides step-by-step guidance to configure User Self-Care using the IBM Security Access Manager Advanced Access Control add-on. The first set of exercises show how to configure the standard out-of- the-box functionality. Further exercises show how User Self-Care can be customized by modifying the provided script files and page templates, and how new functionality can be added.

NEW

In this IBM Security Access Manager (ISAM) webinar replay, you learn about leveraging OIDC mapping rules to enhance JSON Web Tokens (JWT), using SSO Junctions to send JWT to junction applications, and accepting JWT as an authentication token in the Reverse Proxy.

NEW

This lab provides a brief introduction to IBM Security Access Manager (ISAM) V9 Platform administration. You learn how to configure and use the IBM Security Access Manager V9.0.3 Platform module for web access management.

NEW

In this lab, you set up an Active Directory as a Federated directory. Then, you configure the Active Directory users as Basic users in Access Manager.

NEW

IBM Security Access Manager (ISAM) has a built-in demo application that is useful to demonstrate advanced authentication and authorization scenarios. You can also use this application to access information such as ISAM credential and session attributes, HTTP headers, and location attributes useful to diagnose setup problems.

This video course demonstrates the steps to enable and configure the demo application.