IBM Verify: Adoption [TDS_TW900G]

Total time
Location
At location
Starting date and place

IBM Verify: Adoption [TDS_TW900G]

Global Knowledge Network Training Ltd.
Logo Global Knowledge Network Training Ltd.
Provider rating: starstarstarstarstar_border 7.7 Global Knowledge Network Training Ltd. has an average rating of 7.7 (out of 3 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places
placeVirtual Training Centre
14 Apr 2026
placeVirtual Training Centre
10 Aug 2026
placeVirtual Training Centre
12 Oct 2026
Description

OVERVIEW

This course guides learners through the process of adopting IBM Verify in their organization.

It covers the Verify architecture, integration with existing deployments, user import from existing sources, and strategies for migrating and securing legacy applications.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

OBJECTIVES

I…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

OVERVIEW

This course guides learners through the process of adopting IBM Verify in their organization.

It covers the Verify architecture, integration with existing deployments, user import from existing sources, and strategies for migrating and securing legacy applications.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

OBJECTIVES

In this course, you learn to do the following tasks:

  • Identify Verify core capabilities
  • Describe methods of extending Verify and use cases
  • Configure a Verify tenant
  • Create an API client
  • Describe aspects of the CSV import API
  • Explain password considerations
  • Distinguish between a reverse proxy and federation integration

AUDIENCE

  • IT personnel 
  • Systems administrator 
  • IT security architect 
  • IT security deployment specialist

CONTENT

Verify architecture and sizing

This unit introduces the architecture, core features, and extensibility of IBM Verify. It covers key capabilities such as single sign-on (SSO), multi-factor authentication (MFA), adaptive access, governance, and branding. Verify scales dynamically and integrates with on-premises systems via bridges and gateways for authentication, directory sync, provisioning, and application modernization. It supports hybrid environments, risk-based access, and a wide range of deployment scenarios, enabling secure, centralized identity management across cloud and legacy systems.

 

The B Insurance Group case study

This case study follows B Insurance Group (BIG) as it modernizes and consolidates identity and access management across three divisions using IBM Verify. Initially, each division operates independently with separate user directories and branding, resulting in high operational overhead, inconsistent user experiences, and challenges implementing unified security controls, such as multi-factor authentication (MFA). This case study showcases a structured, phased approach to IAM modernization that balances technical, operational, and user experience priorities.

 

Migrating users with CSV import API

This unit introduces the various migration methods available in Verify, describes Verify Cloud Directory, and dives deeper into the use of the CSV import API to migrate users. By the end, you'll have a solid understanding of how to efficiently and securely import users into Verify.

 

Application migration This unit covers application migration and integration with Verify and explains considerations and methods for ensuring a successful migration. Application roles in IAM and the difference between a reverse proxy and federation integration are also explored. 

There are no reviews yet.
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.