Remove a ISAM for Web Response Header

If you want to hide a header from a junctioned server, it is possible to remove it using a HTTP Transformation rule. The steps to making a HTTP Transformation rule are fairly well documented here: http://www-01.ibm.com/support/knowledgecenter/SSPREK_8.0.0.4/com.ibm.isamw.doc_8.0.0.4/wrp_config/concept/con_http_transforms.html?lang=en On the appliance, you need to either create the XSL HTTP Transformation rule and upload it, or you can... Continue Reading →

ISAM for Mobile: Trace statements in Mapping Rules

  Edit (13/1/15): There is another example of trace statements which references a different class in the article: ISAM for Mobile: Javascript Policy Information Points Debugging IBM Security Access Manager (ISAM) for Mobile Mapping rules can be challenging. One of the things that makes it much easier is having regular trace statements. In developing the... Continue Reading →

IBM Security Access Manager: Protecting your site with Context Based Access

In January, I published an article through developerWorks on protecting your website with some of the new features of the ISAM for Web and ISAM for Mobile appliances. It's available here: http://www.ibm.com/developerworks/mobile/library/se-accessmanager/index.html It makes use of Virtual Host Junctions, WebSEAL authentication levels and the comprehensive context based access engine and one time password capabilities in... Continue Reading →

Kerberos Ticket on Unix/Linux “Clock Skew too great”

Have been trying for 24hrs now to configure Desktop SSO for WebSEAL (TAMeb). After having no issues on my VM, doing it in the customers environment proved strangely difficult. After trying to run: /usr/krb5/bin/kinit user@DOMAIN.COM Even after fixing the time servers, I continued to get the message: Unable to obtain initial credentials.         Status 0x96c73a25... Continue Reading →

Website Built with WordPress.com.

Up ↑