Hello,
Thanks for the mention. There is certainly an intention to post the session replays from the MSU event but there have been some delays. I don't have details but hang in there - they are coming.
The session from Shane on using the Verify Gateways (PAM, Windows, RADIUS) with Verify Access is, I think, exactly what you are looking for.
Jon.
------------------------------
Jon Harry
Senior Technical Sales Enablement Specialist
Identity and Access Management
IBM Technology, Worldwide
------------------------------
Original Message:
Sent: Fri May 20, 2022 03:43 AM
From: Jigar Amin
Subject: Verify Gateway for Linux PAM
Hi Jürgen,
Following seems to be the placeholder for "MSU-2022: Verify: Identity and Access Management: Use cases and Best Practices" replays: https://www.securitylearningacademy.com/local/navigator/index.php?level=msu2203
It seems that replays are yet to be made available there. May be @Jon Harry have some idea about the availability of those replays.
Regards,
------------------------------
Jigar Amin
Accelerated Value Specialist
IBM
Original Message:
Sent: Fri May 20, 2022 02:31 AM
From: Jürgen Hitt
Subject: Verify Gateway for Linux PAM
Hi Jigar,
this sounds interesting. Unfortunately I was not able not attend master skills this year.
Do you know where I can find the session from Shane or can someone share this to me?
Regards,
Juergen
------------------------------
Jürgen Hitt
Original Message:
Sent: Wed May 18, 2022 01:33 AM
From: Jigar Amin
Subject: Verify Gateway for Linux PAM
Hi,
You may want to check the following section from ISVA documentation:
https://www.ibm.com/docs/en/sva/10.0.3?topic=configuring-security-verify-gateway
"To instead use a Verify Gateway module with a Verify Access deployment, where the consumer registrations exist in Verify Access, the Verify Gateway integration must be configured. The integration has been implemented with a mapping rule (VerifyGatewayEntry
) and two HTTP transformation rules. There are a number of prerequisites that must be configured before the integration can be used.Two wizards have been created to assist with configuration, which can be run in any of the following order:- Reverse Proxy IBM Security Verify Gateway Configuration
- AAC IBM Security Verify Gateway"
This might be helpful :
https://github.com/IBM-Security/verify-access-aac-mapping-rules/tree/main/mapping_rulesAlso, Shane Weeden gave a session "MFA for windows, Linux and RADIUS using Verfiy Access" in the recent Master skills university, on 5th april 2022. Replay should be available on security learning academy courses section (if not yet then should be available in some time)
Regards,
Jigar.
------------------------------
Jigar Amin
Accelerated Value Specialist
IBM
Original Message:
Sent: Tue May 17, 2022 03:39 AM
From: Jürgen Hitt
Subject: Verify Gateway for Linux PAM
Hello,
I have read the following documentation:
IBM Security Verify Gateway for Linux PAM and AIX PAM (Pluggable Authentication Modules)
We run ISVA 10.0.3 (Software version). I wonder if the solution can be used as well or if it is a Cloud only option ?
Best regards,
Juergen
------------------------------
Jürgen Hitt
------------------------------