What ISAM application configuration change has occured to cause this behavior?
The IBM Security Access Manager (ISAM) V9.0 deployment professional tries to login to the LMI and discovers user “admin” no longer works, even though the correct password is also provided. The Isam deployment professional must use “admin@local”. What ISAM application configuration change has occured to cause this behavior?A . The...
Which two features require an activation key?
A company is upgrading its existing IBM Security Access Manager (ISAM) environment to ISAM 9.0. Based on the requirements for the upgrade, activation keys have been procured for different ISAM modules. Which two features require an activation key? (Choose two.)A . REST APIsB . Web Reverse ProxyC . Authorization ServerD...
Which optional component should be configured to protect against these attacks?
A risk officer of an organization discovered that a site protected by the IBM Security Access Manager V9.0 solution might be vulnerable to common attacks like cross-site scripting (XSS) and SQL injection. Which optional component should be configured to protect against these attacks?A . FederationB . Secure Web SettingsC ....
Which grant type must be enabled when creating the federation?
A deployment professional has a requirement to configure an OpenID Connect federation which does not allow the Relying Party to access the token endpoint. Which grant type must be enabled when creating the federation?A . ImplicitB . Refresh TokenC . Client CredentialsD . Authorization codeView AnswerAnswer: D Explanation: Reference: https://www.ibm.com/developerworks/library/se-configure-ISAM-reverse-proxy-PeP-to-OpenIDconnect-provider-trs/index.html
The initial URL is: https://POCIDP/FIM/sps/saml2idp/saml20/loginitial?
The request in a customer environment is IDP Initiated unsolicited SSO. The initial URL is: https://POCIDP/FIM/sps/saml2idp/saml20/loginitial? RequestBinding =HTTPPost&PartnerId= https://POCSP/isam/sps/abc/saml20&NameIdFormat =Email The POCIDP is Point of Contact for Identity Provider and POCSP is Point of Contact for Service Provider. The customer wants to configure TargetURL within the Service Provider Federation configuration...
The 10.51.140.x/24 IP Address space has been allocated for a new IBM Security Access Manager V9.0 deployment with the option of creating subnets.
The 10.51.140.x/24 IP Address space has been allocated for a new IBM Security Access Manager V9.0 deployment with the option of creating subnets. What are two correct network configurations for Management and Application interface (Choose two.)A . Interface 1.1 = => 10.51.140.51/255.255.255.0 [Management Interface 1.1.==> 10.51.141.52/255.255.255.0 [Application]B . Interface 1.1...
Which HTTP headers should the customer pass?
In a customer environment, a REST API client is being developed to carry out Reverse Proxy configuration and maintenance. As part of one of the activities the customer needs to update the junction information with an additional Backend Server. The customer has written a REST API client but is not...
Which three methods can be used to create user groups in vRealize Operations? (Choose three.)
Which three methods can be used to create user groups in vRealize Operations? (Choose three.)A . The import user groups dialog in Access ControlB . The import user groups dialog in Authentication SourcesC . Add groups dialog in Access ControlD . The vRealize Operations product APIE . The import user...
How can this be done?
A deployment professional in charge of a large deployment with replicated reverse proxy instances needs to keep junctions, template files, and configuration settings in sync between the instances. How can this be done?A . Setup appliance clustering and issue server sync allB . Setup appliance clustering and issue server cluster...
Where should the deployment professional configure a new role and map it to the HelpDesk LDAP group for the support staff?
A customer has configured the IBM Security Access Manager V9.0 appliance authentication to an external LDAP server. The customer wants to allow support staff with LDAP accounts that are members of the HelpDesk group to view appliance and audit logs. Where should the deployment professional configure a new role and...