#ibmcsc For the Argentina 2 CSC team there are 12 IBMers from a plethora of countries: Australia - Philip (Me!) Austria - Stefanie (Blog) Japan - Shiori (Blog [In Japanese]) Netherlands - Nancy (Blog) India - Aravind (Blog), Shweta (Blog), Girija United States - Richard, Niki China - Ping, Chen United Kingdom - Lucy Venezuela... Continue Reading →
What does an Aussie take with them to Argentina?
#ibmcsc It seems an Aussie can't travel without his entourage . He must bring 26 koalas, 2 kangaroos, 60 Tim Tams and two bottles of Vegemite. I wonder if there is anything else that I should bring that is suitably Australian. Background: On the 2nd of May, I depart to Argentina for a four week... Continue Reading →
Fundación Anpuy
#ibmcsc For my time on the Corporate Service Corps (CSC), I've been allocated to work on a project helping Fundación Anpuy. Fundación Anpuy are a small NGO, that focuses on helping children, teenagers and young adults to get through school and university. Typically supporting children from vulnerable situations. The mission of the foundation is to... Continue Reading →
IBM Corporate Service Corps
#ibmcsc Almost two years ago, I was selected into the pool of people who were eligible for the IBM Corporate Service Corps, and finally on the 2nd of May, I depart for Salta, Argentina to begin my four week project with a local NGO organisation - Fundación Anpuy. So what exactly is the IBM CSC?... Continue Reading →
ISAM for Mobile: Trace statements in Mapping Rules
Edit (13/1/15): There is another example of trace statements which references a different class in the article: ISAM for Mobile: Javascript Policy Information Points Debugging IBM Security Access Manager (ISAM) for Mobile Mapping rules can be challenging. One of the things that makes it much easier is having regular trace statements. In developing the... Continue Reading →
ISAM for Mobile: Accessing HTTP Headers in Authentication Service Mapping Rules
On the IBM Security Access Manager (ISAM) for Mobile appliance, the authentication service exposes a number of mapping rules. Four of them are related to the OTP capabilities and the last one is a mapping rule that fires once the authentication service has completed and allows manipulation of the returned ISAM credential. I have a... Continue Reading →
ISAM for Mobile: OAuth Authorization in Mapping Rules
If you'd like to do Authorization in a mapping rule for OAuth, there are a couple of options as to how you do this. On the IBM Security Access Manager (ISAM) for Mobile appliance, API protection exposes two Mapping rules: A) A Pre Token Generation mapping rule named: <API Definition Name>PreTokenGeneration. This mapping rule fires... Continue Reading →