Duration: Hours

IBM Security Access Manager is a modular platform for web, mobile, and cloud access management, multi-factor authentication, risk-based authentication, web-application protection, and identity federation. Its integrated appliance form factor allows for flexible, automated deployment on-premises or in the cloud.

Training Mode: Online


ISAM can provide single sign-on solutions and incorporate back-end web application server resources into its security policy. The IBM Security Access Manager appliance provides access and authentication management for user to web application sessions and helps protect applications from threats.

Introduction to IBM Access Manager

Architecture and installation

1: Exploring the Local Management Interface (LMI)
2: Exploring the command line interface (CLI)
3: Activating the access manager base license
4: Creating a configuration Snapshot
5: Examining the updating also licensing settings
6: Configuring the application interfaces
7: Modifying the host file
8: Configuring the runtime component and the policies
9: creating a reverse proxy instance

Managing users, groups, and domains

1: Creating a user following the policy administration interface
2: After that Importing existing users
3:  A group and correspondingly assigning the group members
4: Create a secure domain at first.
5: Using the pdadmin utility
6: Using pdadmin REST API to create users accordingly groups
7: Navigating Access manager LDAP
8: Exploring global user policies
9: Configuring basic users using Active Directory comparatively Federated Directory

Reverse proxy concepts

1: Editing the instance configuration file
2: At that same time create a Standard junction
3: Exploring the protected object space
4: Updating reverse proxy management pages

Policy based access control

1: Configuring and ACL for Mail Application
2: Creating a time-based protected object policy i.e. (POP)
3: In addition Create an authorization rule
4: Securing web space using an ACL, POP, and groups

Configuring junctions for back-end resources

1: Creating a standard junction using transparent path
2: Adding HTTP headers to a junction
3: Adding an extended attribute to the credentials and as an HTTP header
4: Creating an SSL junction
5: Creating a virtual junction
6: Modifying a request URI using HTTP Transformation
7: Adding a response header by using HTTP Transformation
8: Adding a cookie by using HTTP Transformation

Authentication Framework and methods

1: Creating and importing a certificate authority and user certificates
2: Using the client certificate-based authentication
3: Configuring step-up authentication
4: Performing forced re-authentication
5: Configuring SSO to WebSphere Liberty using LTPA tokens
6: Preparing the Federation module for SSO using JWT Tokens
7: Configuring SSO to WebSphere Liberty using JWT Tokens

Logging, Auditing, and tracing

1: Viewing access Manager logs
2: Using trace utility to trace HTTP requests
3: Creating a support file


For more inputs on ISAM you can connect here.

Contact the L&D Specialist at Locus IT.



There are no reviews yet.

Be the first to review “ISAM (IBM Security Access Manager)”

Your email address will not be published.