A simple, HTTP client helper, leveraging the httpClientHelperV2 class, that can be used throughout mapping rules in Verify Access.
A simple, HTTP client helper, leveraging the httpClientHelperV2 class, that can be used throughout mapping rules in Verify Access.
A simple, easily searchable, standard logging object that can be used repeatably throughout mapping rules in Verify Access.
Upgrading to newer, or downgrading to older versions of IBM Security Verify Access (ISAM/ISVA)? This is how you get past the error message.
Configuring the .well-known endpoint to return OpenID Connect (OIDC) metadata about the authorization server with IBM Security Verify Access (ISAM/ISVA).
How to configure ISAM to create and sign a `private_key_jwt` that is then passed to the Identity Provider (IDP) on the `/token` request when acting as the RP.
How to be more resistent to things such as cross-site scripting (XSS), man-in-the-middle attacks and cross-site request forgery attacks (CSRF).
The ID Token and Access Token in an OAuth or OIDC flow are automatically created in ISAM / Verify Access as part of the API protection, but what happens if we want to customize these tokens and return a custom JWT instead?
Delve deeper into the mechanics of IBM Security Verify Access, find the root-cause of anomalies, better understand performance impacts and eliminate tedious manual work capturing data all with one tool, Dynatrace.
Adding trace statements makes it far easier to troubleshoot and monitor transactions, but what happens when we add too many trace statements to our mapping rules?