Add red flags to risk-based access weights in IBM Security Access Manager

Automatically flag a transaction as risky, regardless of other factors

From the developerWorks archives

Ori Pomerantz

Date archived: December 19, 2016 | First published: November 19, 2013

Learn how configure IBM Security Access Manager to combine the new risk-based access algorithm, which uses weights for different factors, with a "red flag" approach that specifies that particular values are suspicious regardless of what other fields show.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Security
ArticleID=952919
ArticleTitle=Add red flags to risk-based access weights in IBM Security Access Manager
publish-date=11192013