Lab environment for Verify SaaS and Verify Access on Containers
Lab environment for Verify SaaS and Verify Access on Containers
As part of sales engagements, it is common for clients to ask IBM to prove that our proposed solution can be used to implement the use cases that they need to meet their business requirements. This pre-prepared environment, along with an IBM Security Verify SaaS (Verify SaaS) tenant, can be used to build out a wide variety of use cases covering both workforce and consumer identity and access management. The Verify SaaS POC guide, linked from the resources section, provides the high-level steps, and pointers to additional assets, to help guide you in configuring some common use case scenarios.
The Centos Virtual Machine in the environment has container and Kubernetes services installed which can be used to exlore Verify Access container deployment. A step-by-step guide for deployment in a Kubernetes cluster is included in the resources section.
For Verify SaaS VSKOTA Prerequisites, select and complete at least 3 Scenarios from the lab guide.
Complete at least one of CIAM Scenarios below
CIAM for Insurance
CIAM for Banking
CIAM for Public
CIAM for Healthcare
CIAM for Distribution
For Verify Access VSKOTA Prerequisites, complete the entire lab guide.
Option 1, restore configuration from back up, will significantly reduce the time to conduct the lab by automatically configuring the Verify Access image.
Option 2, Configure Verify Access with LMI, will provide step by step instructions to configure Verify Access from scratch.
The Verify Access and Verify SaaS exercises share the same skytap environment.