Description
ISAM can provide single sign-on solutions and incorporate back-end web application server resources into its security policy. The IBM Security Access Manager appliance provides access and authentication management for users to web application sessions and helps protect applications from threats.
Introduction to IBM Access Manager
Architecture and Installation
1: Exploring the Local Management Interface (LMI)
2: Exploring the command line interface (CLI)
3: Activating the access manager base license
4: Creating a configuration Snapshot
5: Examining the updating also licensing settings
6: Configuring the application interfaces
7: Modifying the host file
8: Configuring the runtime component and the policies
9: creating a reverse proxy instance
Managing users, groups, and domains
1: Creating a user following the policy administration interface
2: After that Importing existing users
3:Â A group and correspondingly assigning the group members
4: Create a secure domain at first.
5: Using the pdadmin utility
6: Using pdadmin REST API to create users accordingly groups
7: Navigating Access manager LDAP
8: Exploring global user policies
9: Configuring basic users using Active Directory comparatively Federated Directory
Reverse proxy concepts
1: Editing the instance configuration file
2: At that same time create a Standard junction
3: Exploring the protected object space
4: Updating reverse proxy management pages
Policy based access control
1: Configuring and ACL for Mail Application
2: Creating a time-based protected object policy i.e. (POP)
3: In addition Create an authorization rule
4: Securing web space using an ACL, POP, and groups
Configuring junctions for back-end resources
1: Creating a standard junction using transparent path
2: Adding HTTP headers to a junction
3: Adding an extended attribute to the credentials and as an HTTP header
4: Creating an SSL junction
5: Creating a virtual junction
6: Modifying a request URI using HTTP Transformation
7: Adding a response header by using HTTP Transformation
8: Adding a cookie by using HTTP Transformation
Authentication Framework and methods
1: Creating and importing a certificate authority and user certificates
2: Using the client certificate-based authentication
3: Configuring step-up authentication
4: Performing forced re-authentication
5: Configuring SSO to WebSphere Liberty using LTPA tokens
6: Preparing the Federation module for SSO using JWT Tokens
7: Configuring SSO to WebSphere Liberty using JWT Tokens
Logging, Auditing, and tracing
1: Viewing access Manager logs
2: Using trace utility to trace HTTP requests
3: Creating a support file
For more inputs on ISAM you can connect here.
Contact the L&D Specialist at Locus IT.
Locus Academy has more than a decade experience in delivering the training/staffing on ISAM IBM Security Access Manager for corporates across the globe. The participants for the training/staffing on ISAMÂ IBM Security Access Manager are extremely satisfied and are able to implement the learnings in their on going projects.
Reviews
There are no reviews yet.