Many second factor authentication systems can be integrated with ISAM for Mobile. In ISAM for Mobile, the second factor authentication can be considered as an obligation. The obligation handler extension point provides integration with external second factor authentication systems. In this new how-to guide by Yaxing Li, Simon Canning, and Codur Sreedhar Pranam, Toopher is used as the external second factor authentication system.
You might also be interested in....
Security intelligence is the smart way to keep the cloud safe.
This whitepaper discusses how with an IBM suite of Intelligence Solutions, Cloud computing can be both attractive and secure.
Download this white paper to learn about:
-- The intelligence capabilities necessary for gaining visibility into, and control over, cloud security.
-- Advanced security intelligence solutions that can close security gaps.
-- The integrated IBM® Security QRadar® suite.
Download "Security intelligence is the smart way to keep the cloud safe."