} } } };
Scenario - Initial configuration
The security administrator wants to construct a new ISAM environment. This environment will be used to protect a single Web application.
The administrator completes the following steps.
- Ensure that a user registry is available for the authentication of users. The administrator can use the ibmcom/verify-access-openldap image that was downloaded from Docker Hub to construct an OpenLDAP user registry if he wishes.
- Pull the 'ibmcom/verify-access' image from Docker Hub.
- Start the configuration container.
- Log onto the LMI of the configuration container, activate the base offering, and configure the ISAM runtime environment and a web reverse proxy instance. After the configuration changes have been completed, deploy the changes.
- Start the web reverse proxy "service" containers (multiple containers might be started for HA/load-balancing).
Parent topic: Scenarios