My first Docker and IBM Containers Experience

Like most technical experimenters, from time to time I want a simple lightweight internet-facing linux box to test things from. There are lots of ways to get one of these, but in this case I also wanted to experiment with Docker, and IBM Containers on Bluemix, so decided to combine the goals into a self-education […]

Using custom certificates and hosts file with Android emulator

When writing mobile applications on Android that utilise the OAuth 2.0 capability of IBM Security Access Manager (or in fact any other interaction with WebSEAL from the Android emulator), I typically want to test my application against a virtual ISAM appliance running on my laptop. This allows quick iterative testing, and gives me a completely […]

Risked-Based Access with Persistent Cookie Device Fingerprint

Using Persistent Cookies for Browser Device Registration with ISAM Advanced Access Technical Overview Many customer enquiries (How do I…..?) related to IBM Security Access Manager and associated technologies cross my path, and I often find it intriguing and a good old-fashioned challenge to try and figure out how to solve some of these problems with […]

Using IBM Tivoli Directory Integrator for Identity Mapping with ISAM 9

Using IBM Tivoli Directory Integrator for Identity Mapping with ISAM 9 Technical Overview This article will describe how to utilize Tivoli Director Integrator (TDI) assembly lines to perform identity mapping operations for Federation configurations or Security Token Service (STS) chains configured in IBM Security Access Manager v9 appliance. It is particularly applicable to existing TFIM […]

An Introduction to Automated Configuration in IBM Security Access Manager v9

An Introduction to Automated Configuration in IBM Security Access Manager v9 Over the past few years IBM Security has demonstrated intent to migrate access management and federation technologies from distributed platform software to a physical/virtual appliance delivery model. This has numerous benefits to both our customers and IBM, with middleware patch management ranking right up […]

Getting Started with IBM Single Sign On for Bluemix

This article will focus on helping you get started with using the IBM Single Sign On Service for Bluemix. What is IBM Bluemix? Put simply, IBM Bluemix is a Platform-as-a-Service (PaaS) offering from IBM. Based on CloudFoundry open source technology, IBM Bluemix allows developers to rapidly assemble and deploy applications. What differentiates IBM’s PaaS offering […]

QRadar Custom Events and Event Enrichment

This article is the third in my series of using QRadar with ISAM WebSEAL. Previously I have written about: Introduction to QRadar Log Management for WebSEAL Administrators QRadar Event Correlation Rules We the left story at the end of the last article with a working correlation rule, however a problem existed in that the rule […]

QRadar Event Correlation Rules

This article is a follow-up to my Introduction to QRadar Log Management for WebSEAL Administrators. In this article we will start with a business question that I was asked to answer, and show how I used QRadar event correlation rules to figure it out. The Business Problem The WebSEAL-protected application environment that I have been […]

Introduction to QRadar Log Management for WebSEAL Administrators

My Introduction to QRadar Log Management for WebSEAL Administrators I’ve been working with IBM Security Access Manager for Web, aka WebSEAL, for a very long time now. Most recently I’ve been responsible for deploying and using our WebSEAL technology, in the appliance form called ISAM for Web, as part of IBM’s Platform-as-a-Service offering known as […]

Pulse 2013

Pulse 2013 Having just returned from our biggest IBM security show of the year in Las Vegas I thought it would be a good idea to share some of my personal highlights from Pulse 2013. Identity and Access Management for Mobile Security Many of those who attended with an interest in the IAM track of […]