IBM Verify: Adoption [TDS_TW900G]
placeVirtual Training Centre 14 Apr 2026 |
placeVirtual Training Centre 10 Aug 2026 |
placeVirtual Training Centre 12 Oct 2026 |
OVERVIEW
This course guides learners through the process of adopting IBM Verify in their organization.
It covers the Verify architecture, integration with existing deployments, user import from existing sources, and strategies for migrating and securing legacy applications.
Virtual Learning
This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
OBJECTIVES
I…
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
OVERVIEW
This course guides learners through the process of adopting IBM Verify in their organization.
It covers the Verify architecture, integration with existing deployments, user import from existing sources, and strategies for migrating and securing legacy applications.
Virtual Learning
This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
OBJECTIVES
In this course, you learn to do the following tasks:
- Identify Verify core capabilities
- Describe methods of extending Verify and use cases
- Configure a Verify tenant
- Create an API client
- Describe aspects of the CSV import API
- Explain password considerations
- Distinguish between a reverse proxy and federation integration
AUDIENCE
- IT personnel
- Systems administrator
- IT security architect
- IT security deployment specialist
CONTENT
Verify architecture and sizing
This unit introduces the architecture, core features, and extensibility of IBM Verify. It covers key capabilities such as single sign-on (SSO), multi-factor authentication (MFA), adaptive access, governance, and branding. Verify scales dynamically and integrates with on-premises systems via bridges and gateways for authentication, directory sync, provisioning, and application modernization. It supports hybrid environments, risk-based access, and a wide range of deployment scenarios, enabling secure, centralized identity management across cloud and legacy systems.
The B Insurance Group case study
This case study follows B Insurance Group (BIG) as it modernizes and consolidates identity and access management across three divisions using IBM Verify. Initially, each division operates independently with separate user directories and branding, resulting in high operational overhead, inconsistent user experiences, and challenges implementing unified security controls, such as multi-factor authentication (MFA). This case study showcases a structured, phased approach to IAM modernization that balances technical, operational, and user experience priorities.
Migrating users with CSV import API
This unit introduces the various migration methods available in Verify, describes Verify Cloud Directory, and dives deeper into the use of the CSV import API to migrate users. By the end, you'll have a solid understanding of how to efficiently and securely import users into Verify.
Application migration This unit covers application migration and integration with Verify and explains considerations and methods for ensuring a successful migration. Application roles in IAM and the difference between a reverse proxy and federation integration are also explored.
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
