Configure common use cases for IBM Security Access Manager for Mobile

From the developerWorks archives

Asha Shivalingaiah, Trevor Norvill, and Christopher Hockings

Date archived: December 19, 2016 | First published: May 21, 2014

This document gives readers an overview of a set of common use cases for the IBM Security Access Manager for Mobile Appliance, specifically focused on the use of OAuth and One Time Password authentication to deliver secure apps. It will provide details around how to configure the appliance to support these use cases. The common mobile pattern of a mobile app user registration and access pattern will be described, and the article then details how to implement the business logic required to enable the scenario in the IBM Security Access Manager (ISAM) for Mobile product.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Security
ArticleID=971644
ArticleTitle=Configure common use cases for IBM Security Access Manager for Mobile
publish-date=05212014