Configure common use cases for IBM Security Access Manager for Mobile

21 May 2014
Share:
Asha Shivalingaiah

Asha Shivalingaiah

Software Engineer, IBM

Find me on LinkedIn

Trevor Norvill

Trevor Norvill

Advisory Software Engineer, IBM

Christopher  Hockings

Christopher Hockings

Senior Certified IT Specialist, Master Inventor, IBM

Manage Insider Threats

Learn How to Manage Insider Threats

In addition to monitoring networks and applications for external threats, enterprises must be able to monitor and ensure separation of duties for their administrators and other privileged users in an IT environment. This webcast shows how your organization can help secure privileged identities across the enterprise, Track and report on privileged account access, and improving control of shared accounts.

Watch the "IBM Security Privileged Identity Manager Webcast."

IBM Security Access Manager for Mobile provides mobile access security protection in an appliance form factor. The ISAM for Mobile offering focuses on user access management. This results in mobile applications with context-aware authorization and improved identity assurance through the use of two-factor authentication capabilities. Adding application vulnerability and device threat protection is beyond the scope of this article, but are logical next steps in delivering a secure app.

A key feature of ISAM for Mobile is the simplified appliance user interface, allowing key mobile security solutions to be rapidly deployed. This article will outline how to implement a pattern for enabling business with a mobile security infrastructure using IBM Security Access Manager for Mobile. With any mobile deployment, there is a set of business logic that needs to be configured into the system. In ISAM for Mobile, there are a number of extension points where JavaScript configuration can be inserted to implement the logic required. This white paper shows how to configure the system and apply this business logic to implement a set of common use cases.

READ:Download the white paper

READ:Visit the security on developerWorks community

READ:Subscribe to the security on developerWorks newsletter

Add a comment

Note: HTML elements are not supported within comments.


1000 characters left

developerWorks: Sign in

Required fields are indicated with an asterisk (*).


Need an IBM ID?
Forgot your IBM ID?


Forgot your password?
Change your password

By clicking Submit, you agree to the developerWorks terms of use.

 


The first time you sign into developerWorks, a profile is created for you. Information in your profile (your name, country/region, and company name) is displayed to the public and will accompany any content you post, unless you opt to hide your company name. You may update your IBM account at any time.

All information submitted is secure.

Choose your display name



The first time you sign in to developerWorks, a profile is created for you, so you need to choose a display name. Your display name accompanies the content you post on developerWorks.

Please choose a display name between 3-31 characters. Your display name must be unique in the developerWorks community and should not be your email address for privacy reasons.

Required fields are indicated with an asterisk (*).

(Must be between 3 – 31 characters.)

By clicking Submit, you agree to the developerWorks terms of use.

 


All information submitted is secure.

static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Security
ArticleID=971644
ArticleTitle=Configure common use cases for IBM Security Access Manager for Mobile
publish-date=05212014