IBM Security Verify

 View Only

Lua HTTP Transformations in IBM Security Verify Access

By Shane Weeden posted 22 days ago

  
I've started putting together a small collection of Lua HTTP transformation rules and utility functions that I've found useful when working on some recent cusotmer use cases. The ability to read and modify request and response bodies, implement an EAI-based authenticaiton mechanism, implement your own authorization logic, and more are all outstanding new capabilities in IBM Security Verify Access and I believe this feature of the product will be very popular with practitioners when working on advanced or unusual scenarios.

Feel free to check out the resources here: https://github.com/sbweeden/blog_assets/tree/master/lua_http_transformations

If you have any specific use cases you'd like to see covered, feel free to respond here and I'll see if I can put an example together.


0 comments
5 views

Permalink