Toggle navigationAirlock Secure Access HubAbout this documentAbout Airlock IAMRelease notesSecurity best practicesInstallation and upgradeQuick start guideData sourcesInstallation on LinuxIAM as Docker imageGetting the Docker imageContainer deploymentExternal secretsStorage and volumesExamplesQuickstart using embedded H2Docker stackCustom imagesTroubleshooting Upgrade Airlock IAMOperationInitial configurationConfiguration managementAuthenticationSelf-servicesTarget applicationsOAuth and OIDCSAMLAPI access control Flows (Airlock IAM concept)Loginapp ConfigurationAdminapp ConfigurationService Container ConfigurationTransaction Approval ConfigurationIAM REST APIsCustomizing UIs and textsThird-party licensesInstallation and upgradeIAM as Docker imageExamplesExamplesThe following examples show a range of typical aims and objectives when working with Docker Airlock IAM images.Chapter contentExample - Quickstart using the embedded H2 databaseExample - Docker stackExample - Custom images
The following examples show a range of typical aims and objectives when working with Docker Airlock IAM images.
Chapter contentExample - Quickstart using the embedded H2 databaseExample - Docker stackExample - Custom images