TDS_TW900G IBM Verify: Adoption
This course guides learners through the process of adopting IBM Verify in their organization. It covers the Verify architecture, integration with existing deployments, user import from existing sources, and strategies for migrating and securing legacy applications.Virtual LearningThis interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
COURSE OBJECTIVE:
In this course, you learn to do the following tasks: • Identify Verify core capabilities • Describe methods of extending Verify and use cases • Configure a Verify tenant • Create an API client • Describe aspects of the CSV import API • Explain password considerations • Distinguish between a reverse proxy and federation integration
TARGET AUDIENCE:
• IT personnel • Systems administrator • IT security architect • IT security deployment specialist
COURSE PREREQUISITES:
Not available. Please contact.
COURSE CONTENT:
Verify architecture and sizingThis unit introduces the architecture, core features, and extensibility of IBM Verify. It covers key capabilities such as single sign-on (SSO), multi-factor authentication (MFA), adaptive access, governance, and branding. Verify scales dynamically and integrates with on-premises systems via bridges and gateways for authentication, directory sync, provisioning, and application modernization. It supports hybrid environments, risk-based access, and a wide range of deployment scenarios, enabling secure, centralized identity management across cloud and legacy systems. The B Insurance Group case studyThis case study follows B Insurance Group (BIG) as it modernizes and consolidates identity and access management across three divisions using IBM Verify. Initially, each division operates independently with separate user directories and branding, resulting in high operational overhead, inconsistent user experiences, and challenges implementing unified security controls, such as multi-factor authentication (MFA). This case study showcases a structured, phased approach to IAM modernization that balances technical, operational, and user experience priorities. Migrating users with CSV import APIThis unit introduces the various migration methods available in Verify, describes Verify Cloud Directory, and dives deeper into the use of the CSV import API to migrate users. By the end, you'll have a solid understanding of how to efficiently and securely import users into Verify. Application migration This unit covers application migration and integration with Verify and explains considerations and methods for ensuring a successful migration. Application roles in IAM and the difference between a reverse proxy and federation integration are also explored.
FOLLOW ON COURSES:
Not available. Please contact.