• Airlock Secure Access Hub
  • About this document
  • About Airlock IAM
  • IAM 8.3 release notes
  • Security best practices
  • Installation and upgrade
    • Quick start guide
    • Data sources
    • Installation on Linux
    • IAM as Docker image
      • Getting the Docker image
      • Container deployment
      • External secrets
      • Storage and volumes
      • Examples
        • Quickstart using embedded H2
        • Docker stack
        • Custom images
      • Troubleshooting
    • Upgrade Airlock IAM
  • Operation
  • Initial configuration
  • Configuration management
  • Authentication
  • Self-services
  • Target applications
  • OAuth and OIDC
  • SAML
  • API access control
  • Flows (Airlock IAM concept)
  • Loginapp Configuration
  • Adminapp Configuration
  • Service Container Configuration
  • Transaction Approval Configuration
  • IAM REST APIs
  • Customizing UIs and texts
  • Third-party licenses
  1. Installation and upgrade
  2. IAM as Docker image
  3. Examples

Examples

The following examples show a range of typical aims and objectives when working with Docker Airlock IAM images.

Chapter content

Example - Quickstart using the embedded H2 database
Example - Docker stack
Example - Custom images