Verify Access: PoPs, ACLs, and Junctions (TW111G)

Overview

In this course, you learn about the IBM Verify Access access control mechanisms, Reverse Proxy junctions, authentication methods, as well as logging, auditing, and troubleshooting.  You gain skills around how to implement the variety of Verify Access Reverse Proxy junctions, including the configuration of authentication and authorization processes. This course also provides a solid foundation around setting up logging and auditing, preparing you to successfully manage troubleshooting scenarios.

Audience

IT personnel 

Systems administrator 

IT security architect 

IT security deployment specialist

Prerequisites

null

Objective

In this course, you learn about the following foundational capabilities:

  • Explain the object space and the protected objects concept
  • Describe how to control access to the protected objects by using Access Control List (ACL) policies, Protected Object Policies (POP), and Authorization rules
  • Understand the concept of context-based access
  • Describe the Reverse Proxy junctions
  • Explain the basic concepts of Verify Access authentication
  • Describe the core set of authentication methods that are supported by the Reverse Proxy
  • Discuss supplemental post-authentication processes
  • Describe the Verify Access logging framework in a containerized deployment
  • Describe Verify Access auditing capabilities
  • Explain how to troubleshoot the deployment
Detaylari Göster

Course Outline

IBM Verify Access POPs, ACLs, and junctions

 

  • Managing access control
  • Explain the object space and the protected objects concept
  • Control access to the protected objects by using Access Control List (ACL) policies
  • Describe and configure Protected Object Policies (POP)- Describe and configure Authorization rules
  • Reverse Proxy junctions- Describe and configure standard junctions
  • Provide an overview of the URL modification methods supported by the Reverse Proxy
  • Describe and configure virtual host junctions
  • Authentication framework and methods- Explain the basic concepts of Verify Access authentication
  • Describe the core set of authentication methods that are supported by the Reverse Proxy
  • Discuss supplemental post-authentication processes
  • Describe the password processing policy options available during the Reverse Proxy authentication
  • Logging, auditing, and troubleshooting
  • Describe the Verify Access logging framework (containerized deployment)
  • Describe Verify Access auditing capabilities
  • Explain how to troubleshoot the deployment and collect the support files for problem determination