Toggle navigationAboutRelease and supportInstallation and upgradeData sourcesInstallation on LinuxIAM as Docker imageGetting the Docker imageContainer deploymentExternal secretsStorage and volumesExamplesQuickstart using embedded H2Docker stackCustom imagesTroubleshooting Upgrade Airlock IAMOperationInitial configurationConfiguration managementAuthenticationSelf-servicesTarget applicationsOAuth and OIDCSAMLAPI access controlFlows (Airlock IAM concept)Loginapp ConfigurationAdminapp ConfigurationService Container ConfigurationTransaction Approval ConfigurationIAM REST APIsCustomizing UIs and textsSecurity best practicesThird-party licensesInstallation and upgradeIAM as Docker imageExamplesExamplesThe following examples show a range of typical aims and objectives when working with Docker Airlock IAM images.Chapter contentExample - Quickstart using the embedded H2 databaseExample - Docker stackExample - Custom images
The following examples show a range of typical aims and objectives when working with Docker Airlock IAM images.
Chapter contentExample - Quickstart using the embedded H2 databaseExample - Docker stackExample - Custom images