IBM Verify: Adoption [TDS_TW900G]
placeVirtual Training Centre 17 feb. 2026 |
placeVirtual Training Centre 14 apr. 2026 |
placeVirtual Training Centre 10 aug. 2026 |
placeVirtual Training Centre 12 okt. 2026 |
Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.
OVERVIEW
This course guides learners through the process of adopting IBM Verify in their organization.
It covers the Verify architecture, integration with existing deployments, user import from existing sources, and strategies for migrating and securing legacy applications.
Virtual Learning
This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
OBJECTIVES
I…
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.
OVERVIEW
This course guides learners through the process of adopting IBM Verify in their organization.
It covers the Verify architecture, integration with existing deployments, user import from existing sources, and strategies for migrating and securing legacy applications.
Virtual Learning
This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
OBJECTIVES
In this course, you learn to do the following tasks:
- Identify Verify core capabilities
- Describe methods of extending Verify and use cases
- Configure a Verify tenant
- Create an API client
- Describe aspects of the CSV import API
- Explain password considerations
- Distinguish between a reverse proxy and federation integration
AUDIENCE
- IT personnel
- Systems administrator
- IT security architect
- IT security deployment specialist
CONTENT
Verify architecture and sizing
This unit introduces the architecture, core features, and extensibility of IBM Verify. It covers key capabilities such as single sign-on (SSO), multi-factor authentication (MFA), adaptive access, governance, and branding. Verify scales dynamically and integrates with on-premises systems via bridges and gateways for authentication, directory sync, provisioning, and application modernization. It supports hybrid environments, risk-based access, and a wide range of deployment scenarios, enabling secure, centralized identity management across cloud and legacy systems.
The B Insurance Group case study
This case study follows B Insurance Group (BIG) as it modernizes and consolidates identity and access management across three divisions using IBM Verify. Initially, each division operates independently with separate user directories and branding, resulting in high operational overhead, inconsistent user experiences, and challenges implementing unified security controls, such as multi-factor authentication (MFA). This case study showcases a structured, phased approach to IAM modernization that balances technical, operational, and user experience priorities.
Migrating users with CSV import API
This unit introduces the various migration methods available in Verify, describes Verify Cloud Directory, and dives deeper into the use of the CSV import API to migrate users. By the end, you'll have a solid understanding of how to efficiently and securely import users into Verify.
Application migration This unit covers application migration and integration with Verify and explains considerations and methods for ensuring a successful migration. Application roles in IAM and the difference between a reverse proxy and federation integration are also explored.
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
