Allow customers to register a browser-based device as trusted
In this video, see how to implement risk-based access and consent-based device fingerprinting to increase security for customer profiles.
Learn how to use IBM Security Access Manager and IBM Tivoli Federated Identity Manager to enable customers to give consent to register a browser-based device as a trusted device for managing their Internet profiles on a company website (in this case, JKE Enterprises.) This function employs a risk-based, access governing policy to evaluate the current session authentication level and registration status. The demonstration is intended for security architects, IT architects, and administrators.
See Resources for relevant links.
- To understand more about the risk-based access capability, visit the IBM Tivoli Federated Identity Manager Information Center, which will provides getting started information, a feature overview, and information on how to install and configure for your business needs.
- Visit the IBM Security Access Manager for Web Version 7.0 Information Center to get more information regarding the installation and administration of IBM Security Access Manager.
- Visit the IBM Security Access Manager for Web on developerWorks community to learn more about Access Manager.
- Visit the IBM Tivoli Federated Identity Manager Version 220.127.116.11 Information Center to get more information regarding the installation and administration of Federated Identity Manager.
- Visit the IBM IAM Business Value Accelerators Community to learn more about key deployment accelerators relating to topics such as cloud, mobile, compliance, and governance.
- Get more information on security topics in the Security site on developerWorks.
- Visit the Security On developerWorks blog to learn about new security-related how-to guides, articles, and demo videos.
- Sign up for the weekly Security On developerWorks newsletter for the latest security headlines.
Get products and technologies
- Get involved in the developerWorks Community. Connect with other developerWorks users while exploring the developer-driven blogs, forums, groups, and wikis.
- Download a trial version of an IBM Security product.
- Visit the Security Management Forum to join in the discussion about IBM's identity and access management products.
- Follow @dwsecurity to get updates from the developerWorks security zone in real time.
- Follow @developerWorks on Twitter.
Dig deeper into Security on developerWorks
Get samples, articles, product docs, and community resources to help build, deploy, and manage your cloud apps.
Experiment with new directions in software development.
Software development in the cloud. Register today to create a project.
Evaluate IBM software and solutions, and transform challenges into opportunities.