IBM Security Verify

 View Only
  • 1.  Reference Documentation on Mechanisms

    Posted Fri April 30, 2021 05:44 AM
    Where can I find documentation where I can find detailed information about each individual mechanisms available?
    For example, There is a SCIM Endpoint Configuration.
    What does this mechanism do?
    Alternatively, where can I find the code to understand what it does, and how should I use it, when to use it?
    Are there dependencies between mechanisms? In the policy definitions, how should I sequence the mechanisms?

    ------------------------------
    Joao Goncalves
    Pyxis, Lda.
    ------------------------------


  • 2.  RE: Reference Documentation on Mechanisms

    Posted Thu May 06, 2021 11:29 AM

    Hi Joao,

    The mechanisms are covered in the documentation:
    https://www.ibm.com/docs/en/sva/10.0.1?topic=aacc-authentication
    There's a page for each mechanism.
    This course on Security Learning Academy covers the Advanced Authentication: https://www.securitylearningacademy.com/course/view.php?id=3910

    The SCIM endpoint configuration mechanism initializes a SCIM client and adds a reference to it to the context.  This is then read in subsequent mechanisms which use that SCIM client to perform actions against user objects.  It is used extensively within the user self care policies (if you want to see examples of use).
    I have a video and cookbook on Security Learning Academy: https://www.securitylearningacademy.com/course/view.php?id=3724

    Some Authentication mechanisms are written in JavaScript in which case you can view the code.  You can identify these because their type is JavaScript (or InfoMap).

    Quite a few mechanisms are native code mechanisms - in this case you can't read the code.  They are part of the product.

    Jon.



    ------------------------------
    Jon Harry
    Consulting IT Security Specialist
    IBM
    ------------------------------