Access and Authentication

Calling all IBM Tivoli Federated Identity Manager Customers

Share this post:

An open letter to our IBM Tivoli Federated Identity Manager customers,


As part of the IBM Security Access Manager development teams ongoing focus to support our customer base we are hoping to gain a better understanding as to how we can assist our IBM Tivoli Federated Identity Manager customers to migrate to our IBM Security Access Manager Federation offering. To assist us to better understand how we can help and where we need to focus our future development efforts we have created the following survey –



The survey is primarily targeted towards customers that are currently using IBM Tivoli Federated Identify Manager and would like to share some details about their deployment.  The survey asks specific questions about how you and your business is currently using IBM Tivoli Federated Identity Manager to meet your business use cases. The development team is hoping that we can use this information as part of our future release planning to ensure that we are building specific items that will greatly assist with future migrations.

For everyone that fills out the survey I would like to say thank you for your time and your continued support. I look forward to working together to ensure that we are able to meet your and your business needs with our offerings in the future.


Regards & Best Wishes,

Anthony Ferguson

IBM Security Access Manager Release and Development Manager



Click here to rate this article

Rate this article :

IBM Security Access Manager Release & Development Manager

More Access and Authentication stories
By on March 14, 2019

ISAM Advanced Access Control Infomap to run info.js

In the past Level II Support has received Cases asking for various ways to force the running of the info.js script which is needed for AAC device registration.  The Knowledge Center section Configuring the attribute collection service notes to add the URL of info.js to the <head> block in the HTML landing page of your application.  […]

Continue reading

By Scott Exton on March 6, 2019

Hybrid ISAM Environments

IBM Security Access Manager introduced support for Docker a few years ago with the publishing of the IBM Security Access Docker image.  The interest in Docker has recently increased and questions are now being asked around how to run both the appliance and Docker in the same environment.  This is especially useful for customers who have […]

Continue reading

By Scott Exton on February 7, 2019

IBM Security Access Manager Helm Charts

IBM has published a Helm chart which can be used to easily deploy an IBM Security Access Manager environment within a Kubernetes infrastructure. What is Helm? In simple terms Helm is a management layer which sits in front of Kubernetes and can be used to manage the various elements of a Kubernetes environment (e.g. deployments […]

Continue reading