This is a guest post written by Milan Patel, Product Manager, IBM Security Verify.

IBM Security Verify SaaS is a purpose-built Identity-as-a-Service (IDaaS) to help clients optimize how they protect applications from the cloud. This includes single sign-on, multifactor authentication, governance, and more from the cloud. As clients look to modernize applications through a hybrid cloud approach, a consistent and secure framework is required. This consists of advanced security policies, modern security protocols, and an on-ramp to leveraging these modern and advanced security from legacy identity approaches.

IBM Security Verify SaaS helps protect any user for any application across any cloud through an as-a-Service experience. As clients run multicloud deployments, Verify SaaS becomes the centralized platform to protect applications.

 Listen to Scott Exton introduce IBM Security Verify Operator


Bringing developer time to value to Red Hat OpenShift with IBM Security Verify

With Red Hat OpenShift, clients are enabled to use Red Hat SSO, a software enabled access management solution, to provide singlesign-on, multifactor authentication, and more to help protect the OpenShift platform and applications built on OpenShift.

To provide an additional deployment model value to OpenShift clients, we are announcing the start of how clients can benefit from building on the Red Hat OpenShift platform with IBM Security Verify. Security and identity are critical enablers of how modernization is experienced and are in most cases implied as part of application development; however, it is a very complex topic that consists of redefining and evaluating existing and new Identity and Access Management (IAM) stacks. As we see the inherent value for our clients to start their journey to cloud-built on OpenShift, the need to make our client journey simpler is critical, from a business and technology perspective.

This is why we are introducing two on-ramps for Red Hat OpenShift clients to experience the value from IBM Security Verify: 

  • IBM Security Verify Operator
  • IBM Security Verify SSO

 IBM Security Verify Operator

The IBM Security Verify Operator provides OpenShift admins and developers a streamlined way for protecting applications with IBM Security Verify. Admins and/or developers can configure their OpenShift environment to leverage IBM Security Verify SaaS so applications can be dynamically onboarded and protected through a single IDaaS experience. Developers do not have to worry about configuring all their applications one at a time with IBM Security Verify., Instead, they can automate the onboarding of applications using Dynamic Client Registration, based on the OpenID Connect Specification.

The Verify Operator is certified and available via the Red Hat OpenShift catalog. In conjunction with the NGINX operator, the Verify Operator can be used to streamline all resources through the NGINX ingress controller. When NGINX is used as the ingress controller, the Verify Operator can be leveraged using special annotations in the ingress definition to protect all services.

image1-Jan-14-2022-04-14-38-91-PM

 

IBM Security Verify SaaS SSO

As part of simplifying the on-ramp of protecting applications built on OpenShift, we are also providing an IBM Security Verify SSO plan for clients/developers who do not have an existing Verify SaaS tenant to start protecting applications from the cloud. Clients modernizing with OpenShift will be able to use a "no user or application limit" deployment of IBM Security Verify SaaS tenant with single sign-on. IBM Security Verify SaaS also comes with a modernization framework that allows the preservation of legacy sign-on experiences while coexisting with modern sign-on experience, using the IBM Application Gateway.

image2-Jan-14-2022-04-14-38-66-PM

IBM Security Verify SaaS for OpenShift clients also comes with the following capabilities:

  • Scalable directory
  • Integration with existing identity sources
  • Social log-in
  • Base analytics dashboards for authentication activity
  • Application onboarding and self-service developer portal
  • Data privacy and consent engine
  • Hosted user registration and profile management capabilities
  • Branding and customization of the tenant but also consumer experiences

As part of simplifying the developer experience, IBM Security Verify provides an easy way to export the credential information required by the Verify Operator so that it can communicate with IBM Security Verify SaaS.

As the need for more advanced capabilities are needed, administrators and developers can simply add more capability such as multifactor authentication, governance, advanced risk-based authentication, and advanced analytics with a simple subscription enabled.


See it in action

 



Get started now

To get started, install the IBM Security Verify Operator. You will be able to obtain your Verify SSO tenant or bring your existing tenant.

If you already have Red Hat SSO and want to extend how IBM Security Verify SaaS can provide additional capabilities, see the open source extensions available.

Get started right away with IBM Security Verify

 


저자 소개

Red Hatter since 2018, technology historian and founder of The Museum of Art and Digital Entertainment. Two decades of journalism mixed with technology expertise, storytelling and oodles of computing experience from inception to ewaste recycling. I have taught or had my work used in classes at USF, SFSU, AAU, UC Law Hastings and Harvard Law. 

I have worked with the EFF, Stanford, MIT, and Archive.org to brief the US Copyright Office and change US copyright law. We won multiple exemptions to the DMCA, accepted and implemented by the Librarian of Congress. My writings have appeared in Wired, Bloomberg, Make Magazine, SD Times, The Austin American Statesman, The Atlanta Journal Constitution and many other outlets.

I have been written about by the Wall Street Journal, The Washington Post, Wired and The Atlantic. I have been called "The Gertrude Stein of Video Games," an honor I accept, as I live less than a mile from her childhood home in Oakland, CA. I was project lead on the first successful institutional preservation and rebooting of the first massively multiplayer game, Habitat, for the C64, from 1986: https://neohabitat.org . I've consulted and collaborated with the NY MOMA, the Oakland Museum of California, Cisco, Semtech, Twilio, Game Developers Conference, NGNX, the Anti-Defamation League, the Library of Congress and the Oakland Public Library System on projects, contracts, and exhibitions.

 
UI_Icon-Red_Hat-Close-A-Black-RGB

채널별 검색

automation icon

오토메이션

기술, 팀, 인프라를 위한 IT 자동화 최신 동향

AI icon

인공지능

고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트

open hybrid cloud icon

오픈 하이브리드 클라우드

하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요

security icon

보안

환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보

edge icon

엣지 컴퓨팅

엣지에서의 운영을 단순화하는 플랫폼 업데이트

Infrastructure icon

인프라

세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보

application development icon

애플리케이션

복잡한 애플리케이션에 대한 솔루션 더 보기

Virtualization icon

가상화

온프레미스와 클라우드 환경에서 워크로드를 유연하게 운영하기 위한 엔터프라이즈 가상화의 미래