C1000-120 Exam Information and Guideline
IBM Security Verify SaaS v1 Administrator
Below are complete topics detail with latest syllabus and course outline, that will help you good knowledge about exam objectives and topics that you have to prepare. These contents are covered in questions and answers pool of exam.
- Reporting & Analytics
- Describe the various supported reports
- Analyze audit events
- General Administration
- Identify the various default admin roles
- Create new admin roles
- Manage certificates
- Customize look and feel of IBM Security Verify
- Supporting Developers
- Add the Developer portal to IBM Security Verify
- Add and configure an API client
- Integration
- configuration integration capabilities with IBM Resilient
- MaaS360 integration for Verify
- IBM Security QRadar integration for IBM Security Verify
- hybrid scenarios with IBM Verify Access
- device manager integration with 3rd party unified endpoint management solutions
- Consent & Privacy
- Manage an end user license agreement
- Manage privacy purposes
- Create privacy rules
- Describe the consent types
- Assign rules to policy
- User Access, Lifecycle, & Governance
- Force business justification for application access
- Provision users in target application
- Run account synchronization
- Manage recertification campaigns
- User Management
- Manage users
- Add a new attribute
- Describe the methods for user import / creation to the cloud directory
- Describe the purpose of the SCIM protocol and its application
- Describe and manage groups
- Add a federated identity source
- Add a social identity source
- Describe just in time provisioning in an identity source?
- Connect an on-prem identity source with an identity agent
- Configure identity linking
- Configure password policy
- Security Controls
- Enable inline multifactor authentication enrollment
- Apply access policies to the admin console and homepage
- Create and modify a security access policy for SSO
- Describe adaptive access capability
- Select access policy type
- Configure second factor authentication methods
- Describe authentication methods supported in IBM Verify
- Describe the enrolling process in the Verify app
- Configure passwordless authentication
- Describe the way IBM Security Verify protects access to operating systems
- Describe the way IBM Security Verify protects VPN RADIUS access
- Application Management
- Add a SAML 2.0 application to IBM Security Verfiy
- Add an OIDC 1.0 application
- Describe application types
- Identify the right component for single sign on for legacy app
- Distinguish between native and federated applications
- Determine the correct grant type
- Select authentication protocol with JWT token
- Describe the use of an access policy for SSO
- Configure account life cycle for a target application
- Create and assign application roles
- Assign entitlement to users and groups
- Assign purposes to applications
- Create a custom application profile
- Perform SSO troubleshooting