Mobile device risk-based access and authentication governance

Demonstration on providing a higher level of security confidence for transactions using mobile devices

From the developerWorks archives

Jenny Wong

Date archived: December 19, 2016 | First published: January 27, 2014

Discover how the IBM® Tivoli® Federated Identity Manager risk-based access capability can provide assessment decision and enforcement capabilities for device consent purposes and establish a high level of confidence for insurance purchase transactions. The article also showcases the use of OAuth mobile access and authorization with OAuth Access tokens when performing transaction- and risk-based access on mobile devices.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Security
ArticleID=960493
ArticleTitle=Mobile device risk-based access and authentication governance
publish-date=01272014