This session with a Technical Support expert will be an overview how JSON Web Tokens (JWT) are used in IBM Security Access Manager. Learn how to Leverage OIDC Mapping rules to enhance JWT, how SSO Junctions send JWT to junctioned applications, and about accepting JWT as an authentication token in the Reverse Proxy.

Event Details

Leveraging JSON Web Tokens (JWTs) in IBM Security Access Manager


Available On Demand until