About
Assets
Archive

Based in Melbourne, Australia.

—

Developer
Life

Anthony Galiamov
HTTP Client Helper Function for Verify Access
Jun 24

Jun 24 HTTP Client Helper Function for Verify Access

Anthony Galiamov
ISAM, Learn, Setup

A simple, HTTP client helper, leveraging the httpClientHelperV2 class, that can be used throughout mapping rules in Verify Access.

Simple Logger Function for Verify Access
Dec 18

Dec 18 Simple Logger Function for Verify Access

Anthony Galiamov
ISAM

A simple, easily searchable, standard logging object that can be used repeatably throughout mapping rules in Verify Access.

ISAM or ISVA Upgrade Failing?
Feb 22

Feb 22 ISAM or ISVA Upgrade Failing?

Anthony Galiamov
ISAM, WebSEAL

Upgrading to newer, or downgrading to older versions of IBM Security Verify Access (ISAM/ISVA)? This is how you get past the error message.

OIDC Discovery Endpoint - Configuring .well-known in ISAM/ISVA
Sep 26

Sep 26 OIDC Discovery Endpoint - Configuring .well-known in ISAM/ISVA

Anthony Galiamov
ISAM, WebSEAL

Configuring the .well-known endpoint to return OpenID Connect (OIDC) metadata about the authorization server with IBM Security Verify Access (ISAM/ISVA).

Configuring ISAM as a Relying Party using Private Key JWT - OIDC
Dec 18

Dec 18 Configuring ISAM as a Relying Party using Private Key JWT - OIDC

Anthony Galiamov
ISAM

How to configure ISAM to create and sign a `private_key_jwt` that is then passed to the Identity Provider (IDP) on the `/token` request when acting as the RP.

Setting SameSite and Other Cookie Attributes using WebSEAL
Nov 12

Nov 12 Setting SameSite and Other Cookie Attributes using WebSEAL

Anthony Galiamov
ISAM, WebSEAL

How to be more resistent to things such as cross-site scripting (XSS), man-in-the-middle attacks and cross-site request forgery attacks (CSRF).

Setting Custom OAuth Tokens in ISAM
Sep 12

Sep 12 Setting Custom OAuth Tokens in ISAM

Anthony Galiamov
ISAM

The ID Token and Access Token in an OAuth or OIDC flow are automatically created in ISAM / Verify Access as part of the API protection, but what happens if we want to customize these tokens and return a custom JWT instead?

Adding Dynatrace to Verify Access - Why You Need This
Jul 27

Jul 27 Adding Dynatrace to Verify Access - Why You Need This

Anthony Galiamov
WebSEAL, ISAM

Delve deeper into the mechanics of IBM Security Verify Access, find the root-cause of anomalies, better understand performance impacts and eliminate tedious manual work capturing data all with one tool, Dynatrace.

Writing Logs in Verify Access - Performance Implications
Jul 26

Jul 26 Writing Logs in Verify Access - Performance Implications

Anthony Galiamov
ISAM

Adding trace statements makes it far easier to troubleshoot and monitor transactions, but what happens when we add too many trace statements to our mapping rules?

Load More
 

ISAM | Terminal Commands | Environment Setup | Learn How to Hack