Identity and Access Management (IAM)


Welcome to the IBM Security IAM Community, where product users and IBMers come together to discuss and overcome challenges related to access management and authentication, identity governance and administration, and privileged access management. Group members will have the opportunity to learn from fellow users of IBM identity and access management solutions and to share your own use cases and best practices so that others may benefit from your experience.

Exclusive technical webinars, demos, how-to blogs and other additional resources will help you expand your knowledge of the latest and most important topics in IAM. We will also keep you up to date regarding product enhancements and regional and virtual user group meetings.

As you continue on your IAM journey, we encourage you to take full advantage of the resources available in this group. Please contact with any questions or feedback.

General IAM Resources

Search Group

Latest Posts

  • Hi, The developers are receiving relatively low number of reports that customers failing to upload docusign documents to the website. They want to increase the default https-timeout setting on a junction from default 120 seconds to 10 minutes. This ...

  • Developers have already used Spring Security to generate a JWT when a user has logged in. I've configured WebSEAL to validate the JWT. This is all working well. In our SPA we want to hit back end API's on behalf of the logged in user. Today we are ...

  • Profile Picture

    RE: Stop Using DSC?

    Hi Troy, To quickly cover the SMS vs DSC thing: SMS was the previous incarnation of DSC. SMS used an external service (WebSphere "Extreme Scale") to provide a distributed cache. It was a complex component which required careful deployment planning ...

Upcoming Events

Latest Articles

  • Several clients have asked to implement the functionality of registering a device using a mobile/native application. When a user logs into the application the first time, the application gets an OAuth access token (using authorization code flow), which ...

    1 person recommends this.
  • Authors: Neeraj Tiwari and Nishant Singhai Here are some common ldap search commands. The next set of examples assumes the following: The server is located on a host named hostname. The server uses port number 389. Since this is the not default ...

    1 person recommends this.
  • This is known issue. To fix this synchronization issue, follow these steps: 1. Change primary node IGI LMI password to old password. 2. Check everything is working and check cluster status, it should show synchronized. If not then try sync. 3. Once ...

Latest Files