Identity and Access Management (IAM)

IAM.jpg

Welcome to the IBM Security IAM Community, where product users and IBMers come together to discuss and overcome challenges related to access management and authentication, identity governance and administration, and privileged access management. Group members will have the opportunity to learn from fellow users of IBM identity and access management solutions and to share your own use cases and best practices so that others may benefit from your experience.

Exclusive technical webinars, demos, how-to blogs and other additional resources will help you expand your knowledge of the latest and most important topics in IAM. We will also keep you up to date regarding product enhancements and regional and virtual user group meetings.

As you continue on your IAM journey, we encourage you to take full advantage of the resources available in this group. Please contact Community Manager Lauren Jensen with any questions or feedback.

General IAM Resources

Search Group

Latest Posts

  • Hello Prashant, Make sure you ran the AAC Configuration tool for the Reverse Proxy instance: Secure Web Settings -> Manage -> Reverse Proxy ->> _instance_ -> Manage -> AAC and Federation Configuration -> Authentication and Context Based Access Configuration ...

  • Hi All, I have configured the AAC for the ISAM 9.0.6 appliance. As part of my requirement, I wanted to send an OTP over mail for a second-factor authentication after a normal username/password. Hence I created a policy as shown in the attached file and ...

  • Hello Kedar, The { "operation" : "login"} response is most likely coming from the Reverse Proxy. It is indicating that you need to authenticate in order to reach the URL you are requesting ( /mga/sps/apiauthsvc). You should check the ACL associated ...

Latest Articles

  • Working from home in a lot of industries is now the standard and yet a lot of organizations still have yet to adopt more modern forms of security when allowing remote users to connect into the corporate network. With IBM Verify and IBM Cloud Identity, ...

  • In a previous post we have looked at how JSON objects can be processed by SDI using JavaScript objects and hierarchical Entries. In this part we will build the same examples with the same tools. Once again, I need to mention that examples in this article ...

  • I have had a couple of projects recently that involved building a custom identity adapter for IBM Security Identity Manager utilizing REST APIs of the target system. Custom Identity Adapters utilize IBM Security Directory Integrator (SDI) as a platform. ...

Latest Files

Community Members
1196 Members
group Admin
group Admin
group Admin
group Admin
group Admin
group Admin
group Admin
group Admin
group Admin
group Admin
group Admin
group Admin