IBM Support

Using IBM Security products to manage user activity on the network

Question & Answer


Question

IBM Security products can be used to manage user activity on the network. This course focuses on using IBM XGS, Identity Manager, and Directory Integrator to control user access.


Duration: 3 Hours 53 Minutes
Follow the link in related information to view the course on the IBM Security Learning Academy

[{"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSRMWJ","label":"IBM Security Identity Manager"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"All Version","Edition":" ","Line of Business":{"code":"LOB77","label":"Automation Platform"}}]

Log InLog in to view more of this document

This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.

Document Information

Modified date:
08 June 2021

UID

ibm16461221