IBM Security Verify

 View Only

Lua HTTP Transformations in IBM Security Verify Access

By Shane Weeden posted Tue May 21, 2024 02:52 PM

I've started putting together a small collection of Lua HTTP transformation rules and utility functions that I've found useful when working on some recent cusotmer use cases. The ability to read and modify request and response bodies, implement an EAI-based authenticaiton mechanism, implement your own authorization logic, and more are all outstanding new capabilities in IBM Security Verify Access and I believe this feature of the product will be very popular with practitioners when working on advanced or unusual scenarios.

Feel free to check out the resources here:

If you have any specific use cases you'd like to see covered, feel free to respond here and I'll see if I can put an example together.