COURSE OBJECTIVE:
In this course, you learn to do the following tasks: • Explain the business context for access management as well as the features and functions of Verify Access • Describe the component architecture • Explain the deployment options • Install and configure Verify Access in a containerized environment • Understand the differences between a virtual machine or containerized deployment • Describe the role of the Verify Access administrator • Learn how to manage user, groups, and domains • Explain the Reverse Proxy concepts and capabilities: • Describe how to control access to the protected objects by using Access Control List (ACL) policies, Protected Object Policies (POP), and Authorization rules • Understand the concept of context-based access • Describe the Reverse Proxy junctions • Explain the basic concepts of Verify Access authentication • Describe the core set of authentication methods that are supported by the Reverse Proxy • Discuss supplemental post-authentication processes • Describe the Verify Access logging framework in a containerized deployment • Describe Verify Access auditing capabilities • Explain how to troubleshoot the deployment
TARGET AUDIENCE:
IT Personnel, System Administrator, IT Security Architect, IT Security Deployment Specialist
COURSE PREREQUISITES:
null
COURSE CONTENT:
Architecture and deployment • Describe the components • Understand the deployment options • Install and configure Verify Access in a containerized environment • Install and configure Verify Access in a containerized environmentUser, group, and domain configuration • Describe the role of the Verify Access administrator • Learn how to manage user, groups, and domainsReverse proxy concepts • Understand the concept and capabilities • Describe the authentication and authorization processes • Explain the protected object space and how to use junctions- Learn about administrative tasksManaging access control • Explain the object space and the protected objects concept • Control access to the protected objects by using Access Control List (ACL) policies • Describe and configure Protected Object Policies (POP) • Describe and configure Authorization rulesReverse Proxy junctions • Describe and configure standard junctions • Provide an overview of the URL modification methods supported by the Reverse Proxy • Describe and configure virtual host junctionsAuthentication framework and methods • Explain the basic concepts of Verify Access authentication • Describe the core set of authentication methods that are supported by the Reverse Proxy • Discuss supplemental post-authentication processes • Describe the password processing policy options available during the Reverse Proxy authenticationLogging, auditing, and troubleshooting • Describe the Verify Access logging framework (containerized deployment) • Describe Verify Access auditing capabilities • Explain how to troubleshoot the deployment and collect the support files for problem determination
FOLLOW ON COURSES:
Not available. Please contact.