C1000-129 STU Stuc1000129
C1000-129 STU Stuc1000129
C1000-129 STU Stuc1000129
pg. 3
6.10 Modify default template files .................................................................................................... 51
6.11 Integrate custom login application through External Authentication Interface (EAI)............. 51
6.12 Implement advanced authenticated user mapping .................................................................. 52
6.13 Implement access policy ............................................................................................................ 53
6.14 Implement authorization (AUTHZ) rules for reverse proxy ...................................................... 54
6.15 Configure single sign-on using Federation STS .......................................................................... 55
6.16 Configure mobile multi-factor authentication .......................................................................... 56
Section 7: Testing, troubleshooting, and maintenance .......................................................................... 57
7.1 Apply interim fixes ....................................................................................................................... 57
7.2 Apply appliance firmware updates.............................................................................................. 57
7.3 Resolve common problems.......................................................................................................... 58
7.4 Prepare backup storage system................................................................................................... 59
7.6 Configure logging and tracing ...................................................................................................... 61
7.7 Engage with IBM Support ............................................................................................................ 62
pg. 4
Role Definition
This intermediate level certification is intended for deployment professionals working with IBM Security
Verify Access V10.0. These deployment professionals plan, install, configure, administer, tune and
troubleshoot Security Verify Access installations. It is expected that the deployment professional is
generally self-sufficient and can perform the tasks involved in the job role with limited assistance from
peers, product documentation, and vendor support services.
This role specifically does not include routine post-deployment administration tasks.
Prerequisite Knowledge
Knowledge and foundational skills one must possess before acquiring skills measured on the
certification test. These foundational skills are NOT measured on the test.
• Knowledge of cloud architecture
• Concept of containers
• Working knowledge of databases and directories
• Understanding networking protocols and topology
• Knowledge of digital certificates, transport protocols and ciphers
• Knowledge of scripting languages including JavaScript, Python, XSLT
Knowledge of data formats such as YAML, XML, HTML, and JSON
pg. 5
Purpose of Exam Objectives
When a certification exam is being developed, a team of Subject Matter Experts work
together to define the job role the certified individual will fill. They define all the tasks and
knowledge that an individual would need to have in order to successfully perform that role.
This creates the foundation for the objectives and measurement criteria, the foundation of
the certification exam. The Certification item writers used these objectives write questions
that appear on the exam.
It is recommended that you review these objectives carefully. Do you know how to complete
the tasks in the objective? Do you know why that task needs to be done? Do you know what will
happen if you do it incorrectly? If you are not familiar with a task, then work through the
objective and perform that task in your own environment. Read more information about the
task. If there is an objective on a task, it is almost certain that you WILL see questions about it
on the actual exam.
After you have reviewed the objectives and completed your own research, don’t forget to
review the free sample questions for this exam on the IBM Certification website. These
sample question come complete with an answer key and will give you a feel for the type and
style of question on the actual exam.
After that, take the assessment exam. The questions on the assessment exam were
developed at the same time and by the same people who wrote the question on the actual
exam. The assessment exam is weighted to be equally difficult to the actual test so your
results should be predictive of your expected results on the actual test. While the assessment
exam will not tell which questions are answered incorrectly, it will tell you how you did on a
section-by-section basis so you will know where to focus your further studies.
pg. 6
Section 1: Planning
This section contains objectives that deal with preparing for an IBM Security Verify Access 10.0
deployment. These objectives include activities such as conducting planning workshops with the client,
identifying the solution requirements and sizing, documenting access control and log retention
requirements as well as those of federated single sign-on.
- Solution overview
pg. 7
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-user-registry-considerations
• https://www.ibm.com/software/reports/compatibility/clarity/index.html
• https://www.ibm.com/docs/en/sva/10.0.2?topic=overview-documentation-activation-level
• https://www.ibm.com/docs/en/sva/10.0.2?topic=monitoring-sending-statistics-statsd
• https://www.ibm.com/docs/en/sva/10.0.2?topic=settings-configuring-snmp-monitoring
• https://www.ibm.com/docs/en/sva/10.0.2?topic=settings-runtime-monitoring-using-prometheus
- Advanced authentication
- API protection
- Context-based access
- Device fingerprinting
- Device registration
- Fine-grained authorization
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=SSPREK_10.0.2/com.ibm.isva.doc/admin/cpt/help_authentication.h
tml
• https://www.ibm.com/docs/en/sva/10.0.2?topic=support-configuring-oauth-20-api-protection
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-openid-connect-federations
• https://www.ibm.com/docs/en/sva/10.0.2?topic=overview-saml-20
• https://www.ibm.com/docs/en/sva/10.0.2?topic=overview-webseal-introduction
pg. 8
• https://www.ibm.com/docs/en/sva/10.0.2?topic=authentication-methods
- Operating systems
- Related software
- Hypervisors
- Hardware requirements
- Fixes
REFERENCES:
• https://www.ibm.com/software/reports/compatibility/clarity/softwareEos.html
• https://www.ibm.com/software/reports/compatibility/clarity/index.html
• https://www.ibm.com/support/fixcentral
- Disk
- Memory
- Network
- Hypervisors
pg. 9
1.4.2 Review Performance Tuning Guide
- Tuning Guides
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-user-registry-considerations
• https://xsizer.dal1a.ciocloud.nonprod.intranet.ibm.com/sizer.html
- Mapping rules
- Template pages
- Branches
- Conditional access
pg. 10
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.1?topic=concepts-spnego-protocol-kerberos-authentication
• https://www.ibm.com/docs/en/sva/10.0.1?topic=control-acl-entries
• https://www.ibm.com/docs/en/sva/10.0.1?topic=aacc-authentication
• https://www.ibm.com/docs/en/sva/10.0.1?topic=configuration-branching-authentication-policies
- On appliance requirement
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.1?topic=entries-parameters-logcfg-entry
• https://www.ibm.com/docs/en/sva/10.0.1?topic=agents-sending-events-remote-syslog-server
- Federation types
- Federation Roles
pg. 11
1.7.5 Determine Token Exchange Requirements
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-federation-overview
• https://www.ibm.com/docs/en/sva/9.0?topic=profiles-saml-20-profile-initial-urls
• http://ibm.biz/isamfedcookbook
• https://www.ibm.com/docs/en/sva/9.0.6?topic=solutions-single-sign-security-token-service
• https://www.ibm.com/docs/en/sva/9.0?topic=federations-configuring-sts-modules
• https://www.ibm.com/docs/en/sva/9.0?topic=formats-alias-service
pg. 12
Section 2: Architecture and Design
This section contains objectives that deal with the architecture and design of the IBM Security Verify
Access 10.0 solution, including activities such as selecting appropriate deployment patterns and
topology, designing the HA and DR architecture, determining deployment processes, identifying network
requirements, backup procedures, server connectivity, junction types, authentication methods and
required session failover.
- HW
- VM
- Containers
- All-in-One
- Kubernetes / OpenShift
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-cluster-general-reference
• https://www.ibm.com/software/reports/compatibility/clarity-
reports/report/html/vesForProduct?deliverableId=B406C6E0555B11EBBBEA1195F7E6DF31&osPlatforms=&duCompo
nentIds=S002|S003|A001
• https://www.ibm.com/docs/en/sva/10.0.2?topic=registries-configuring-runtime-authenticate-basic-users
• https://www.ibm.com/docs/en/sva/10.0.2?topic=support-docker-image-security-verify-access
pg. 13
- Dual Data Center
- Cloud Regions
- Appliance snapshots
- Hypervisor snapshots
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=services-cluster-service-considerations
• https://www.ibm.com/docs/en/sva/10.0.2?topic=services-failover-in-cluster
• https://www.ibm.com/docs/en/sva/10.0.2?topic=support-high-availability-policy-server
• https://www.ibm.com/docs/en/sva/10.0.2?topic=environments-consistent-configuration-all-webseal-replica-servers
• https://www.ibm.com/docs/en/sva/10.0.2?topic=environments-failover-new-master
• https://www.ibm.com/docs/en/sva/10.0.2?topic=synchronization-cluster-restart
• https://www.ibm.com/docs/en/sva/10.0.2?topic=synchronization-configure-webseal-cluster-support
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-database
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-runtime-database
• https://www.ibm.com/docs/en/sva/10.0.2?topic=database-deploying-external-configuration
• https://www.ibm.com/docs/en/sva/10.0.2?topic=database-deploying-external-runtime
• https://www.ibm.com/docs/en/sva/10.0.2?topic=overview-secure-deployment-considerations
- LMI Only
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.1?topic=configuring
• https://www.ibm.com/docs/en/sva/10.0.1?topic=administering
• https://www.ibm.com/docs/en/sva/10.0.1?topic=developing-rest-api-documentation
• https://www.ibm.com/docs/en/sva/10.0.1?topic=developing-rest-api-documentation-docker
pg. 14
• https://github.com/IBM-Security/isam-ansible-collection
• http://learn.ibm.com/course/view.php?id=14099
• http://learn.ibm.com/course/view.php?id=14097
- balance-rr
- active-backup
- balance-xor
- broadcast
- 802.3ad
- balance-tlb
- balance-alb
REFERENCES:
• http://learn.ibm.com/course/view.php?id=14107
• https://www.ibm.com/docs/en/sva/10.0.2?topic=overview-junction-types
• https://www.ibm.com/docs/en/sva/10.0.2?topic=settings-runtime-parameters
• https://www.ibm.com/docs/en/sva/10.0.1?topic=settings-configuring-static-routes
• https://www.ibm.com/docs/en/sva/10.0.1?topic=routes-multiple-routing-tables
• https://www.ibm.com/docs/en/sva/10.0.1?topic=settings-configuring-aggregated-network-interfaces
pg. 15
2.5 Establish backup procedures
SUBTASKS:
- Snapshot (Cluster)
- Persistent Volumes
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=settings-managing-snapshots
• https://www.ibm.com/docs/en/sva/10.0.2?topic=maintenance-back-up-procedures
• https://www.ibm.com/docs/api/v1/content/SSPREK_10.0.1/com.ibm.isva.doc/develop/rapi/docker/Creating_a_new
_snapshot.xml
• https://www.ibm.com/docs/en/sva/10.0.1?topic=support-docker-image-security-verify-access
- Oracle
- DB2
- Solid DB
- PostgreSQL
- LDAP
- SMTP
- Web Service
- Cloud Identity
- ISAM Runtime
REFERENCES:
pg. 16
• https://www.ibm.com/docs/en/sva/10.0.1?topic=gs-server-connections
• https://www.ibm.com/docs/en/sva/10.0.1?topic=sc-server-connection-properties
- Load-balancer Terminated
- Load-balancer Pass-thru
- Direct access
- Using -b option
- TFIM Junction
- JWT Junction
- Trust Association
- HTTP Headers
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=stanza-web-host-name
• https://www.ibm.com/docs/en/sva/10.0.2?topic=stanza-web-http-port
• https://www.ibm.com/docs/en/sva/10.0.2?topic=stanza-web-http-protocol
• https://www.ibm.com/docs/en/sva/10.0.2?topic=stanza-web-https-port
• https://www.ibm.com/docs/en/sva/10.0.2?topic=stanza-web-https-protocol
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-single-sign-solutions
- Username/Password
- OAUTH / OIDC
- Certificate Authentication
- Domain cookies
pg. 17
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.1?topic=concepts-spnego-protocol-kerberos-authentication
• https://www.ibm.com/docs/en/sva/10.0.1?topic=interface-external-authentication-overview
• https://www.ibm.com/docs/en/sva/10.0.1?topic=methods-openid-connect-oidc-authentication
• https://www.ibm.com/docs/en/sva/10.0.1?topic=overview-saml-20
• https://www.ibm.com/docs/en/sva/10.0.1?topic=authentication-client-side-certificate-modes
- Failover Cookie
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=concepts-failover-cookie
• https://www.ibm.com/docs/en/sva/10.0.2?topic=settings-managing-distributed-session-cache-in-docker
• https://www.ibm.com/docs/en/sva/10.0.2?topic=overview-advantages-using-distributed-session-cache
• https://www.ibm.com/docs/en/sva/10.0.2?topic=dsco-failover-environment
• https://www.ibm.com/docs/en/sva/10.0.2?topic=environments-option-3-failover-cookies
• https://www.ibm.com/docs/en/sva/10.0.2?topic=overview-failover-environment
pg. 18
Section 3: Installation
This section contains objectives that deal with the installation of the IBM Security Verify Access 10.0
solution, including activities such as finding and installing updates, creating virtual machines, preparing
the user registry and databases, deploying containers, installing licenses and activating components,
configuring the network and importing certificates.
REFERENCES:
• https://www.ibm.com/support/fixcentral/swg/selectFixes?parent=IBM%20Security&product=ibm/Tivoli/IBM+Securit
y+Verify+Access&release=All&platform=Linux&function=all
3.2.1 Determine the requirements for running Verify Access in your target hypervisor.
- Ensure you have the correct installation media or disk image for the target hypervisor
- Create the virtual machine, attaching the installation media, ensuring the correct number of virtual
network adapters are attached, and any additional requirements in the documentation are followed
3.2.3 Deploy the Verify Access disk image as a new virtual machine
3.2.4 Complete the first steps setup and access the Local Management Interface
- Complete the first steps setup process using the Local Management Interface
- Complete the first steps setup process using the REST API
- Verify that the Local Management Interface can be accessed via a web browser
- Verify that the command line interface can be accessed via SSH
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.0?topic=started-virtual-appliance-tasks
• https://www.ibm.com/docs/en/sva/10.0.0?topic=tasks-command-line-interface-initial-appliance-settings-wizard
• https://www.ibm.com/docs/en/sva/10.0.0?topic=ct-security-verify-access-appliance-setup-wizard-by-using-local-
management-interface
• https://www.ibm.com/docs/en/sva/10.0.0?topic=appliance-local-management-interface
• https://www.ibm.com/docs/en/sva/10.0.0?topic=appliance-command-line-interface
- Locate and download the correct Verify Access LDAP schema file for the target user registry using the
Local Management Interface
- No anonymous access
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.0?topic=configuration-user-registry-server-installation
pg. 20
3.4 Prepare databases
SUBTASKS:
- Identify and download the correct database schema for the target database
- Identify and download the correct database schema for the target database
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.0?topic=database-deploying-external-runtime
• https://www.ibm.com/docs/en/sva/10.0.0?topic=database-deploying-external-configuration
3.5.1 Download the Verify Access container images from Docker Hub
3.5.3 Ensure the Kubernetes environment is prepared for executing the Verify Access images
- Apparmor requirements
pg. 21
3.5.4 Ensure the OpenShift environment is prepared for executing the Verify Access images
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.0?topic=support-docker-image-security-verify-access
- Install the required activation codes using the Local Management Interface
- Download the support license from the IBM Security Systems License Key Center at
https://ibmss.flexnetoperations.com
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.0?topic=orchestration-kubernetes-support
• https://www.ibm.com/docs/en/sva/10.0.0?topic=tasks-activating-product-buying-support
pg. 22
3.7.2 Configure IP addresses
- Identify which addresses will be used for management and application traffic
- Add the IP addresses to each interface using the Local Management Interface
- Configure any required static host entries using the Local Management Interface
- Verify that application servers, databases, the user registry, any required external services are
contactable
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.0?topic=settings-appliance-port-usage
• https://www.ibm.com/docs/en/sva/10.0.0?topic=settings-configuring-interfaces
• https://www.ibm.com/docs/en/sva/10.0.0?topic=settings-configuring-static-routes
• https://www.ibm.com/docs/en/sva/10.0.0?topic=settings-configuring-dns
• https://www.ibm.com/docs/en/sva/10.0.0?topic=settings-testing-connection
- AAC/Federation runtime
- Mutual TLS (client certs) for application servers, databases, the user registry, any required external
services
pg. 23
3.8.2 Identify the required signer certificates and import them:
- Database server(s)
- User registry
- Downstream/junctioned applications
- Federation partners
- Other external services and APIs called from advanced customized flows (Google ReCAPTCHA, SMS API
gateways etc.)
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=settings-viewing-updating-management-ssl-certificates
pg. 24
Section 4: Configuration
This section contains objectives that deal with the configuration of the IBM Security Verify Access 10.0
solution, including activities such as integrating federated directories, configuring the cluster, base
runtime component, web reverse proxy instance and numerous other components.
- Internal or External DB
- Load certificates
- Supported DBs
- Internal or External DB
- Load certificates
- Supported DBs
- Failover support
- Enable multi-node
pg. 25
- Monitor status of node
- Certificate keystores
- Runtime configuration
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.1?topic=configuration-database
• https://www.ibm.com/docs/en/sva/10.0.1?topic=configuration-runtime-database
• https://www.ibm.com/docs/en/sva/10.0.1?topic=settings-managing-cluster-configuration
• https://www.ibm.com/docs/en/sva/10.0.1?topic=settings-managing-cluster-
configuration#tsk_manage_cluster_config__add_node
• https://www.ibm.com/docs/en/sva/10.0.1?topic=configuration-session-cache-reference
• https://www.ibm.com/docs/en/sva/10.0.1?topic=settings-managing-distributed-session-cache-in-docker
- Local or remote
- Management suffix
- Management domain
- SSL settings
- connection
- Bind DN
- SSL Settings
- enable
- prevent duplicates
- search priority
- Create with UI
- Bulk import
REFERENCES:
• None
- connection information
- bind information
- SSL Settings
- Suffixes
- ignore-if-down
pg. 27
- mod uid on import
- configuring replicas
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=concerns-federated-registry-support
• https://www.ibm.com/docs/en/sva/10.0.2?topic=registries-configuring-runtime-authenticate-basic-users
• https://www.ibm.com/docs/en/sva/10.0.2?topic=registries-managing-federated-directories
- Transport settings
- configure ciphers
- Use of IPv6
- Basic Authentication
- Form-based authentication
- Kerberos Authentication
pg. 28
- OIDC Authentication
- OAuth Authentication
- LTPA
- Timeouts
- Reauthentication
- DSC/Redis
- Failover
- HTTP/Secure flags
- Cookie jar
- Cookie reset
- SameSite
- CORS
- Replication
- P3P policy
- Proxy protocol
REFERENCES:
• None
pg. 29
4.5 Configure authorization server
SUBTASKS:
- Listening Ports
REFERENCES:
• None
4.6.2 Create local users and groups in the embedded user registry
4.6.3 Select or create roles with appropriate levels of access for administrator accounts
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.0?topic=settings-configuring-management-authentication
• https://www.ibm.com/docs/en/sva/10.0.0?topic=settings-managing-roles-users-groups
- Create ACLs
- Auditing policy
- Attach POPs
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=entries-type-attribute
• https://www.ibm.com/docs/en/sva/10.0.2?topic=registries-configuring-runtime-authenticate-basic-users
• https://www.ibm.com/docs/en/sva/10.0.2?topic=policy-changing-mapping-http-request-methods
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.0?topic=settings-server-connections
pg. 31
- 2FA mechanisms
- Add mechanisms
- Configure branching
- Cookieless operation
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.0?topic=configuration-branching-authentication-policies
4.10.1 Create a server connection to the LDAP/user registry where user profile data will be stored
- server connection
- search/user suffix
- user dn attribute
pg. 32
4.10.4 Configure SCIM for Verify Access integration:
4.10.5 Configure the Reverse Proxy as a point of contact for the SCIM service:
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.1?topic=management-user-self-care-scim-api
• https://www.ibm.com/docs/en/sva/10.0.1?topic=configuration-user-profile
• https://www.ibm.com/docs/en/sva/10.0.1?topic=api-limitations#con_scim_limitation__unsupported_endpoints
- Configure consent
- Attribute mapping
- metadata endpoint
pg. 33
- static vs dynamic registration
- PKCE
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=provider-configuring-reverse-proxy-oauth-oidc
• https://www.ibm.com/docs/en/sva/10.0.2?topic=protection-creating-api-definition
• https://ibm.biz/isamfedcookbook
• https://www.ibm.com/blogs/security-identity-access/oauth-saml-jwt-grant-type/
• https://www.ibm.com/docs/en/sva/10.0.2?topic=support-oauth-20-oidc-workflows
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=settings-configuring-system-alerts
• https://www.ibm.com/docs/en/sva/10.0.1?topic=auditing
• https://www.ibm.com/docs/en/sva/10.0.1?topic=auditing-configuring-appliance
pg. 34
Section 5: System integration
This section contains objectives that deal with the systems integration of the IBM Security Verify Access
10.0 solution, including activities such as configuring the junction, protecting the API, integrating with
federated single sign-on partners, configuring SPNEGO, configuring token authentication, setting up the
monitoring framework, configuring external authentication interface and integrating with SIEM systems.
- TCP
- SSL
- Mutual SSO
- Standard junctions
- junction name
- Stateful / not
- Fail-over behavior
- Mutually authenticated
- fine-grained: query_contents
- various
pg. 35
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-creating-mutual-junctions
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-standard-webseal-junctions
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-virtual-hosting
• https://www.ibm.com/docs/en/sva/10.0.2?topic=hosting-virtual
• https://www.ibm.com/docs/en/sva/10.0.2?topic=junctions-creation-junction-initial-server
• https://www.ibm.com/docs/en/sva/10.0.2?topic=solutions-client-identity-in-http-ba-headers
• https://www.ibm.com/docs/en/sva/10.0.2?topic=solutions-forms-single-sign-concepts
• https://www.ibm.com/docs/en/sva/10.0.2?topic=solutions-ltpa-overview
• https://www.ibm.com/docs/en/sva/10.0.2?topic=junctions-mutually-authenticated-ssl-process-summary
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-pdadmin-server-task-create-command
• https://www.ibm.com/docs/en/sva/10.0.2?topic=headers-http-tag-value-extended-attribute-junctions
• https://www.ibm.com/docs/en/sva/10.0.2?topic=junctions-stateful-junction-concepts
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.1?topic=support-oidc-dynamic-clients
- SAML 2.0
- WS-Federation
- OpenID Connect
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-saml-federations-overview
• https://www.ibm.com/docs/en/sva/10.0.2?topic=overview-customizing-saml-identity-mapping
• https://www.ibm.com/docs/en/sva/10.0.2?topic=overview-saml-20-bindings
• https://www.ibm.com/docs/en/sva/10.0.2?topic=federations-managing-federation-partners
- Configure
- Test
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=sign-configure-embedded-kerberos-client
• https://www.ibm.com/docs/en/sva/10.0.2?topic=sign-create-identity-webseal-in-active-directory-domain
• https://www.ibm.com/docs/en/sva/10.0.2?topic=sign-map-kerberos-principal-active-directory-user
• https://www.ibm.com/docs/en/sva/10.0.2?topic=sign-verify-webseal-authentication-keytab-file
• https://www.ibm.com/docs/en/sva/10.0.2?topic=sign-add-service-name-keytab-file-entries
• https://www.ibm.com/docs/en/sva/10.0.2?topic=sign-enable-spnego-webseal
• https://www.ibm.com/docs/en/sva/10.0.2?topic=sign-configure-internet-explorer-client
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=settings-managing-rsa-securid-configuration
• https://www.ibm.com/docs/en/sva/10.0.2?topic=authentication-enabling-token
- Turn on Statistics
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=alerts-configuring-snmp-alert-objects
• https://www.ibm.com/docs/en/sva/10.0.2?topic=settings-configuring-snmp-monitoring
• https://www.ibm.com/docs/en/sva/10.0.2?topic=settings-runtime-monitoring-using-prometheus
• https://www.ibm.com/docs/en/sva/10.0.2?topic=monitoring-sending-statistics-statsd
pg. 38
5.7 Configure external authentication interface
SUBTASKS:
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.0?topic=interface-external-authentication-http-header-reference
REFERENCES:
• https://www.ibm.com/blogs/sweeden/introduction-to-qradar-log-management-for-webseal-administrators/
pg. 39
Section 6: Advanced customization
This section contains objectives that deal with the advanced customization of the IBM Security Verify
Access 10.0 solution including numerous activities, such as implementing a context-based access control
policy, creating a risk profile, implementing identity mapping and many other tasks.
- Save Policy
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=administration-access-control-policies
• https://www.ibm.com/docs/en/sva/10.0.2?topic=policies-policy-scenarios
• https://github.com/IBM-Security/isam-support/tree/master/config-example/aac/access-control-policy
• https://www.ibm.com/docs/en/sva/10.0.2?topic=policies-creating-access-control-policy
• https://www.ibm.com/docs/en/sva/10.0.2?topic=policies-managing-access-control-policy-sets
pg. 40
• https://www.ibm.com/docs/en/sva/10.0.2?topic=policies-managing-access-control-policy-attachments
• https://www.ibm.com/docs/en/sva/10.0.2?topic=services-configuring-advanced-access-control-authentication-
reverse-proxy
- Risk score represents the variation from baseline set of attributes between previous registered devices
and the current 'device' context
- 'Secure Access Control -> Policy -> Attributes ->> New Attribute'
- 'Secure Access Control -> Policy -> Risk Profiles ->> New Risk Profile'
pg. 41
- Select risk profile from left panel
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=overview-risk-score-calculation
• https://www.ibm.com/docs/en/sva/10.0.2?topic=profiles-predefined-risk
• https://www.ibm.com/docs/en/sva/10.0.2?topic=attributes-predefined
• https://www.ibm.com/docs/en/sva/10.0.2?topic=attributes-managing
• https://www.ibm.com/docs/en/sva/10.0.2?topic=profiles-managing-risk
• https://www.ibm.com/docs/en/sva/10.0.2?topic=overview-risk-reports
- 'System -> Secure Settings -> File Downloads ->> access_control -> doc -> ISVA-javadoc-10.0.1.zip'
- Download from 'System -> Secure Settings -> File Downloads ->> access_control -> examples ->
mapping_rules -> ip_saml_20.js'
- Download from 'System -> Secure Settings -> File Downloads ->> access_control -> examples ->
mapping_rules -> sp_saml_20.js'
- Define Attribute sources to acquire attribute values from different data sources
pg. 42
- Review JavaScript Allowlist to determine usable classes
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.1?topic=csim-mapping-local-identity-saml-20-token
- 'Secure Access Control -> Policy -> Information Points ->> New'
- 'Manage System Settings -> Secure Settings -> File Downloads ->> access_control -> doc -> ISVA-
javadoc-10.0.2.zip'
- Navigate to 'Secure Access Control -> Global Settings -> Server Connections'
- Secure Access Control -> Policy -> Information Points -> New'
- Determine PIP name (This will be the value of the 'issuer' for custom attributes that are derived from
this PIP)
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=administration-policy-information-points
• https://www.ibm.com/docs/en/sva/10.0.2?topic=settings-managing-file-downloads
• https://www.ibm.com/docs/en/sva/10.0.2?topic=points-managing-policy-information
• https://www.ibm.com/docs/en/sva/10.0.2?topic=points-server-connections
• https://www.ibm.com/docs/en/sva/10.0.2?topic=points-server-connection-properties
• https://www.ibm.com/docs/en/sva/10.0.2?topic=points-javascript-pip
- Determine whether any other mechanisms are needed for your desired workflow
- Validate configuration
- 'AAC -> Global Settings -> Server Connections ->> New ->> Web Service'
- 'AAC -> Policies -> Authentication ->> Mechanisms ->> New Authentication Mechanism ->> SCIM
Config'
- Customize the User self care policies if more or less steps are necessary
- 'AAC -> Global Settings -> template Files ->> (Locale) -> authsvc -> usc'
pg. 45
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=management-user-self-care-operations
• https://www.ibm.com/docs/en/sva/10.0.2?topic=administration-scim-configuration
• https://www.ibm.com/docs/en/sva/10.0.2?topic=connections-server-connection-properties
• https://www.ibm.com/docs/en/sva/10.0.2?topic=aacc-authentication
• https://www.ibm.com/docs/en/sva/10.0.2?topic=policies-managing-authentication-mechanisms
• https://www.ibm.com/docs/en/sva/10.0.2?topic=policies-creating-authentication-policy
• https://www.ibm.com/docs/en/sva/10.0.2?topic=files-managing-template
- Acquire from the appliance at 'System -> Secure Settings -> File Downloads ->> access_control -> doc ->
ISVA-javadoc-10.0.2.zip'
- Download from 'System -> Secure Settings -> File Downloads ->> access_control -> examples ->
mapping_rules -> infomap_username.js'
- Review
pg. 46
- Navigate to 'AAC -> Policy -> Authentication ->> Mechanisms -> New Authentication Mechanism ->>
infoMap'
- Determine name
- Determine identifier
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=settings-managing-file-downloads
• https://www.ibm.com/docs/en/sva/10.0.2?topic=mechanism-available-parameters-in-info-map
• https://www.ibm.com/docs/en/sva/10.0.2?topic=files-managing-template
• https://www.ibm.com/docs/en/sva/10.0.2?topic=authentication-configuring-info-map-mechanism
• https://www.ibm.com/docs/en/sva/10.0.2?topic=policies-creating-authentication-policy
• https://www.ibm.com/docs/en/sva/10.0.2?topic=settings-runtime-parameters
6.7.4 Update the Reverse Proxy configuration for the HTTP Transformation
- Access URL
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.0?topic=transformations-configuration
• https://www.ibm.com/docs/en/sva/10.0.0?topic=junctions-http-transformations
• https://www.ibm.com/docs/en/sva/10.0.0?topic=rules-replacing-http-response
6.8.1 Determine what customization is needed for the API Protection Definition
pg. 48
- Download copy of mapping rule
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=registration-modifying-consent-template-pages
• https://www.ibm.com/docs/en/sva/10.0.2?topic=support-oauth-20-template-page-consent-authorize
• https://www.ibm.com/blogs/security-identity-access/federated-single-sign-on-access-policy/
• https://www.ibm.com/docs/en/sva/10.0.2?topic=apoo-making-oauth-oidc-consent-decision-using-access-policy
• https://www.ibm.com/blogs/security-identity-access/oauth-api-gateways-and-isam/
• https://www.ibm.com/docs/en/sva/10.0.2?topic=protection-oauth-introspection
• https://www.ibm.com/blogs/security-identity-access/oauth-jwt-access-token/
- Review documentation
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=profiles-managing-risk
• https://www.ibm.com/docs/en/sva/10.0.2?topic=profiles-predefined-risk
• https://www.ibm.com/docs/en/sva/10.0.2?topic=scenarios-registering-device-after-user-consent
• https://www.ibm.com/docs/en/sva/10.0.2?topic=administration-device-fingerprints
• https://www.ibm.com/docs/en/sva/10.0.2?topic=reference-user-attribute-definitions-stanza
• https://www.ibm.com/docs/en/sva/10.0.2?topic=reference-azn-decision-info-stanza
• https://www.ibm.com/docs/en/sva/10.0.2?topic=service-configuring-attribute-collection
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-advanced-properties#aac_advcfgprop__d252e782
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-advanced-properties#aac_advcfgprop__d252e990
• https://www.ibm.com/docs/en/sva/10.0.2?topic=policies-managing-access-control-policy-attachments
• https://www.ibm.com/docs/en/sva/10.0.2?topic=fingerprints-managing-device
pg. 50
6.10 Modify default template files
SUBTASKS:
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=settings-template-files
• https://www.ibm.com/docs/en/sva/10.0.2?topic=files-template-file-macros
• https://www.ibm.com/docs/en/sva/10.0.2?topic=pages-template-page-wayf-page
6.11 Integrate custom login application through External Authentication Interface (EAI)
SUBTASKS:
pg. 51
- Determine where data will be sourced
6.11.2 Determine header names that EAI application needs to return to authenticate user
6.11.3 Create External Authentication Interface application to return specified headers and values
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-how-write-external-authentication-application
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-http-header-names-authentication-data
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-extracting-authentication-data-from-special-http-
headers
• https://www.ibm.com/docs/en/sva/10.0.2?topic=features-post-authentication-redirection-external-authentication-
interface
• https://www.ibm.com/docs/en/sva/10.0.2?topic=features-request-caching-external-authentication-interface
pg. 52
6.12.1 Determine Use Case
- Troubleshoot issues
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=methods-authenticated-user-mapping
• https://www.ibm.com/docs/en/sva/10.0.2?topic=mapping-authenticated-user-rule-language
• https://www.ibm.com/docs/en/sva/10.0.2?topic=mapping-umi-xml-document-model
• https://www.ibm.com/docs/en/sva/10.0.2?topic=mapping-containers-xml-umi-container-names
• https://www.ibm.com/docs/en/sva/10.0.2?topic=mapping-xml-user-model
• https://www.ibm.com/docs/en/sva/10.0.2?topic=evaluator-sample-user-mapping-rule
• https://www.ibm.com/docs/en/sva/10.0.2?topic=umre-format-constraints-rules
• https://www.ibm.com/docs/en/sva/10.0.2?topic=mapping-valid-user-attributes
• https://www.ibm.com/docs/en/sva/10.0.2?topic=mapping-enabling-authenticated-user
• https://www.ibm.com/docs/en/sva/10.0.2?topic=evaluator-troubleshooting-user-mapping-rule-problems
pg. 53
6.13.1 Determine use case for access policy
- 'Manage System Settings -> Secure Settings -> File Downloads ->> access_control -> doc -> ISVA-
javadoc-10.0.2.zip'
REFERENCES:
• https://www.ibm.com/blogs/security-identity-access/federated-single-sign-on-access-policy/
• https://www.ibm.com/docs/en/sva/10.0.2?topic=settings-access-policies#access_policies
pg. 54
- Understand format and constraints
- Attach to objectspace
6.14.6 Validate Authorization rule use cases and negative use cases
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=management-authorization-rules-overview
• https://www.ibm.com/docs/en/sva/10.0.2?topic=management-authorization-rule-language
• https://www.ibm.com/docs/en/sva/10.0.2?topic=language-adi-xml-document-model
• https://www.ibm.com/docs/en/sva/10.0.2?topic=are-format-constraints-rules
• https://www.ibm.com/docs/en/sva/10.0.2?topic=evaluator-examples-authorization-rules
• https://github.com/IBM-Security/isam-support/tree/master/config-example/webseal/authz_rule
• http://zvon.org/xxl/XSLTreference/Output/xpathFunctionIndex.html
• https://www.ibm.com/docs/en/sva/10.0.2?topic=rules-create-authorization-rule
• https://www.ibm.com/docs/en/sva/10.0.2?topic=rules-attach-authorization-rule-protected-object
• https://www.ibm.com/docs/en/sva/10.0.2?topic=management-configuration-file-initialization-attributes
pg. 55
- Define Chain Lookup Properties
- Update configuration file to create TFIM SSO Stanza for junction [tfimsso]
REFERENCES:
• https://www.ibm.com/blogs/sweeden/isam-9-0-2-the-jwt-sts-module-and-junction-sso-to-websphere-liberty/
• https://www.ibm.com/docs/en/sva/10.0.2?topic=tis-one-time-token
• https://www.ibm.com/docs/en/sva/10.0.2?topic=solutions-single-sign-security-token-service
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.2?topic=configuration-general-settings
• https://www.ibm.com/docs/en/sva/10.0.2?topic=authentication-authenticator-registration
pg. 56
Section 7: Testing, troubleshooting, and maintenance
This section contains objectives that deal with the testing, troubleshooting and maintenance of the IBM
Security Verify Access 10.0 solution including activities, such as applying interim fixes, appliance
firmware updates, resolving common problems, configuring logging and tracing and other related
activities.
REFERENCES:
• https://www.ibm.com/support/fixcentral/swg/selectFixes?parent=IBM%20Security&product=ibm/Tivoli/IBM+Securit
y+Verify+Access&release=All&platform=Linux&function=all
• https://www.ibm.com/docs/en/sva/10.0.0?topic=licensing-installing-fix-pack
- Review the release notes/What's New for any required actions or notable changes
- Upload the firmware pkg manually using the Local Management Interface
pg. 57
- OR Download the firmware update using the Available Updates page in the Local Management
Interface
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.0?topic=overview-whats-new-in-this-release
• https://www.ibm.com/support/fixcentral/swg/selectFixes?parent=IBM%20Security&product=ibm/Tivoli/IBM+Securit
y+Verify+Access&release=All&platform=Linux&function=all
• https://www.ibm.com/docs/en/sva/10.0.0?topic=licensing-managing-firmware-settings
- Review msg__webseald-instance.log
- Note thread
- Apply an exported Reverse Proxy instance configuration to a new Reverse Proxy instance
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.0?topic=settings-managing-snapshots
• https://www.ibm.com/docs/en/sva/10.0.0?topic=management-exporting-webseal-configuration
• https://www.ibm.com/docs/en/sva/10.0.0?topic=migration-migrating-existing-webseal-instance-appliance
- Database indexes
pg. 59
- Analyze pdweb.debug data with pdweb.debug-timing.pl script
- user registry (sds) perform 'runstats' command to identify current underlying database performance
- Timeouts
- Worker threads
- Rate limiting
REFERENCES:
pg. 60
• https://www.ibm.com/support/pages/system/files/inline-files/$FILE/ISAM_PerfTuning_guide_90_v1_0.pdf
• https://www.ibm.com/docs/en/sva/10.0.2?topic=stanza-max-cached-persistent-connections
• https://www.ibm.com/support/pages/system/files/inline-files/$FILE/ISAM_PerfTuning_guide_90_v1_0.pdf
• https://www.ibm.com/support/pages/ibm-security-access-manager-appliance-available-tcp-tunings
7.6.1 Use tracing to diagnose issue with the reverse proxy or proxied applications
- View or export Reverse Proxy trace logs using the Local Management Interface or command line
interface
- Enable tracing for specific components using the Local Management Interface
- View or export the trace logs using the Local Management Interface or command line interface
- Policy Server
- Federation/AAC Runtime
- System
- View or export the packet tracing capture using the Local Management Interface
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.0?topic=administration-trace-data
• https://www.ibm.com/docs/en/sva/10.0.0?topic=administration-logging
• https://www.ibm.com/docs/en/sva/10.0.0?topic=settings-runtime-parameters
• https://www.ibm.com/docs/en/sva/10.0.0?topic=monitoring-viewing-application-log-files
• https://www.ibm.com/docs/en/sva/10.0.0?topic=settings-managing-packet-tracing
pg. 61
7.7 Engage with IBM Support
SUBTASKS:
REFERENCES:
• https://www.ibm.com/docs/en/sva/10.0.0?topic=settings-managing-support-files
pg. 62