Access Management 7.3.2

Next steps

Congratulations on installing AM!

The following list shows you different tasks you should consider after installing AM:

Core administrative tasks
  • Learn about realms, configure them, and connect them to identity stores.

  • Configure AM’s cookie domain.

  • Learn about other types of configuration stores and decide if your environment would benefit from having dedicated application stores.
    For more information, see the Setup.

Core Token Service tasks
  • Learn about the Core Token Service and decide if your environment would benefit from having dedicated CTS token stores.
    For more information, see the Core Token Service (CTS).

Access Management-related tasks
  • Learn about authentication trees and nodes and configure them to let your users log in to AM.

  • Learn about sessions in AM and configure them for your environment.
    For more information, see the Authentication and SSO

Security-related tasks
  • Secure your core AM environment against different threats.

  • Configure keys and keystores used for different AM features.

  • Change the amAdmin user password.

  • Learn about delegated privileges and configure delegated realm administrators.

  • Configure audit logging services.
    For more information, see the Security.

Maintenance-related tasks
  • Learn how to back up and restore your environment.

  • Learn how to monitor your AM instances.

  • Learn how to enable debug logging and how to record troubleshooting information.

  • Tune AM.
    For more information, see the Maintenance.

AM offers authentication and authorization functionality, which you can expand with Internet specifications and drafts, such as OAuth 2.0, and SAML v2.0.

Once you are confident about your base AM configuration, move on to more advanced features, such as protecting web applications, configuring single sign-on (SSO), federating access across applications, and others.