Community
Search Options
Search Options
Log in
Skip to main content (Press Enter).
Sign in
Skip auxiliary navigation (Press Enter).
Security
Topic groups
IBM Security Cloud Pak for Security
IBM Security Global Forum
IBM Security Guardium
IBM Security MaaS360
IBM Security QRadar
IBM Security QRadar SOAR
IBM Security Trusteer
IBM Security Verify
IBM Security Z Security
IBM Security Skills & Learning
User groups
Events
TechXchange Day
IBM TechXchange Conference
Upcoming Security Events
IBM TechXchange Webinars
All IBM TechXchange Community Events
Participate
Gamification Program
Getting Started
Community Managers' Welcome
Post to Forum
Share a Resource
Share Your Expertise
Blogging on the Community
Connect with Security Users
All IBM TechXchange Community Users
Resources
IBM TechXchange Group
IBM Champions
IBM Cloud Support
IBM Documentation
IBM Support
IBM Support 101
IBM Technology Zone
IBM Training
Security Blogs
IBM Security Experts
Security Learning Academy
Request for Enhancements
IBM TechXchange Community Partner Program
TechXchange Day
Marketplace
Marketplace
IBM Security
Join our 16,000+ members as we work together to
overcome the toughest challenges of cybersecurity.
Start collaborating
Join us for IBM TechXchange Day: AI and Automation
Skip main navigation (Press Enter).
Toggle navigation
Search Options
Security User Groups
User Group Tag Test
IBM Security Verify
View Only
Group Home
Discussion
7.2K
Library
129
Blogs
343
Events
0
Members
2.6K
Share
Lua HTTP Transformations in IBM Security Verify Access
By
Shane Weeden
posted
Tue May 21, 2024 02:52 PM
0
Like
I've started putting together a small collection of Lua HTTP transformation rules and utility functions that I've found useful when working on some recent cusotmer use cases. The ability to read and modify request and response bodies, implement an EAI-based authenticaiton mechanism, implement your own authorization logic, and more are all outstanding new capabilities in IBM Security Verify Access and I believe this feature of the product will be very popular with practitioners when working on advanced or unusual scenarios.
Feel free to check out the resources here: https://github.com/sbweeden/blog_assets/tree/master/lua_http_transformations
If you have any specific use cases you'd like to see covered, feel free to respond here and I'll see if I can put an example together.
0 comments
7 views
Permalink
Security
Topic groups
IBM Security Cloud Pak for Security
IBM Security Global Forum
IBM Security Guardium
IBM Security MaaS360
IBM Security QRadar
IBM Security QRadar SOAR
IBM Security Trusteer
IBM Security Verify
IBM Security Z Security
IBM Security Skills & Learning
User groups
Events
TechXchange Day
IBM TechXchange Conference
Upcoming Security Events
IBM TechXchange Webinars
All IBM TechXchange Community Events
Participate
Gamification Program
Getting Started
Community Managers' Welcome
Post to Forum
Share a Resource
Share Your Expertise
Blogging on the Community
Connect with Security Users
All IBM TechXchange Community Users
Resources
IBM TechXchange Group
IBM Champions
IBM Cloud Support
IBM Documentation
IBM Support
IBM Support 101
IBM Technology Zone
IBM Training
Security Blogs
IBM Security Experts
Security Learning Academy
Request for Enhancements
IBM TechXchange Community Partner Program
TechXchange Day
Marketplace
Marketplace
Powered by Higher Logic