Browser-based device fingerprint with risk-based access

Achieving consent-based, browser device fingerprinting using IBM Security Access Manager and IBM Tivoli Federated Identity Manager

Implement risk-based access and authentication on mobile devices to increase confidence in the security of mobile transactions. Using IBM® Security Access Manager and IBM Tivoli® Federated Identity Manager, evaluate the current session authentication level and registration status.

Jenny Wong (jenwong@au1.ibm.com), Staff Software Engineer, IBM

Photo of Jenny WongJenny Wong is a member of the IBM Security Solutions Team within the Australian Development Lab located at Gold Coast, Queensland. She joined IBM in 2009 as an IBM Security IT Specialist. In her time at IBM, she has worked on various IBM Security products including IBM Security Access Manager, IBM Security Identity Manager, IBM Security Access Manager for Enterprise Single Sign-on, and more. She holds a dual degree in Bachelor of Applied Mathematics and Information Technology from Queensland University of Technology.



09 December 2013

Allow customers to register a browser-based device as trusted

In this video, see how to implement risk-based access and consent-based device fingerprinting to increase security for customer profiles.

SANS 2013 Critical Controls Survey

Learn how zSecure™ 2.1 supports the controls identified in the "SANS 2013 Critical Controls Survey."

Learn how to use IBM Security Access Manager and IBM Tivoli Federated Identity Manager to enable customers to give consent to register a browser-based device as a trusted device for managing their Internet profiles on a company website (in this case, JKE Enterprises.) This function employs a risk-based, access governing policy to evaluate the current session authentication level and registration status. The demonstration is intended for security architects, IT architects, and administrators.

See Resources for relevant links.

Resources

Learn

Get products and technologies

Discuss

Comments

developerWorks: Sign in

Required fields are indicated with an asterisk (*).


Need an IBM ID?
Forgot your IBM ID?


Forgot your password?
Change your password

By clicking Submit, you agree to the developerWorks terms of use.

 


The first time you sign into developerWorks, a profile is created for you. Information in your profile (your name, country/region, and company name) is displayed to the public and will accompany any content you post, unless you opt to hide your company name. You may update your IBM account at any time.

All information submitted is secure.

Choose your display name



The first time you sign in to developerWorks, a profile is created for you, so you need to choose a display name. Your display name accompanies the content you post on developerWorks.

Please choose a display name between 3-31 characters. Your display name must be unique in the developerWorks community and should not be your email address for privacy reasons.

Required fields are indicated with an asterisk (*).

(Must be between 3 – 31 characters.)

By clicking Submit, you agree to the developerWorks terms of use.

 


All information submitted is secure.

Dig deeper into Security on developerWorks


  • Bluemix Developers Community

    Get samples, articles, product docs, and community resources to help build, deploy, and manage your cloud apps.

  • Security

    Pragmatic, intelligent, risk-based IT Security practices.

  • DevOps Services

    Software development in the cloud. Register today to create a project.

  • IBM evaluation software

    Evaluate IBM software and solutions, and transform challenges into opportunities.

static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Security, Mobile development
ArticleID=955694
ArticleTitle=Browser-based device fingerprint with risk-based access
publish-date=12092013