An IBM Certified Administrator – Security Verify SaaS v1 is an individual responsible for the configuration and management of a Security Verify system including integration with identity sources, applications, and other security solutions. This individual will be expected to perform the tasks associated with this responsibility with limited assistance from peers, product documentation, and support resources.
Key areas of competency:
- Manage application integration
- Manage identity source integration
- Manage security controls
- Working knowledge of SAML 2.0, OAuth 2.0, and OIDC 1.0
- Working knowledge of first-factor and second-factor authentication methods
- Working knowledge of available IBM Security Verify integration capabilities
- Working knowledge of identity and access management concepts and processes
An IBM Certified Administrator – Security Verify SaaS v1 is an individual responsible for the configuration and management of a Security Verify system including integration with identity sources, applications, and other security solutions. This individual will be expected to perform the tasks associated with this responsibility with limited assistance from peers, product documentation, and support resources.
Key areas of competency:
- Manage application integration
- Manage identity source integration
- Manage security controls
During exam development, the Subject Matter Experts (SMEs) define all of the tasks, knowledge and experience that an individual would need in order to successfully fulfill their role with the product or solution. These are represented by the objectives below, and the questions on the exam are based upon these objectives.
-
Section 1: Reporting & Analytics6%
- Describe the various supported reports
- Analyze audit events
-
Section 2: General Administration8%
- Identify the various default admin roles
- Create new admin roles
- Manage certificates
- Customize look and feel of IBM Security Verify
-
Section 3: Supporting Developers6%
- Add the Developer portal to IBM Security Verify
- Add and configure an API client
-
Section 4: Integration7%
- Describe the configuration integration capabilities with IBM Resilient
- Describe the MaaS360 integration for Verify
- Describe the IBM Security QRadar integration for IBM Security Verify
- Describe the hybrid scenarios with IBM Verify Access
- Describe the device manager integration with 3rd party unified endpoint management solutions
-
Section 5: Consent & Privacy8%
- Manage an end user license agreement
- Manage privacy purposes
- Create privacy rules
- Describe the consent types
- Assign rules to policy
-
Section 6: User Access, Lifecycle, & Governance12%
- Force business justification for application access
- Provision users in the target application
- Run account synchronization
- Manage recertification campaigns
-
Section 7: User Management18%
- Manage users
- Add a new attribute
- Describe the methods for user import/creation to the cloud directory
- Describe the purpose of the SCIM protocol and its application
- Describe and manage groups
- Add a federated identity source
- Add a social identity source
- Describe just-in-time provisioning in an identity source?
- Connect an on-prem identity source with an identity agent
- Configure identity linking
- Configure password policy
-
Section 8: Security Controls16%
- Enable inline multifactor authentication enrollment
- Apply access policies to the admin console and homepage
- Create and modify a security access policy for SSO
- Describe adaptive access capability
- Select access policy type
- Configure second factor authentication methods
- Describe authentication methods supported in IBM Verify
- Describe the enrolling process in the Verify app
- Configure passwordless authentication
- Describe the way IBM Security Verify protects access to operating systems
- Describe the way IBM Security Verify protects VPN RADIUS access
-
Section 9: Application Management19%
- Add a SAML 2.0 application to IBM Security Verify
- Add an OIDC 1.0 application
- Describe application types
- Identify the right component for single sign on for legacy app
- Distinguish between native and federated applications
- Determine the correct grant type
- Select authentication protocol with JWT token
- Describe the use of an access policy for SSO
- Configure account life cycle for a target application
- Create and assign application roles
- Assign entitlement to users and groups
- Assign purposes to applications
- Create a custom application profile
- Perform SSO troubleshooting
Reviews
There are no reviews yet.