In an organization's testing environment, the IBM Security Access Manager V9.0 deployment professional is required to deploy the virtual appliance on AmazonEC2 with a single reverse proxy instance with a single network interface.How should the deployment professional configure the reverse proxy so that end-users can access the reverse proxy without specifying a non-standard port (other than 80 and 443)?
A company has deployed an IBM Security Manager V9.0 solution to protect web resources and now wants to secure access to enterprise resources from mobile devices. The security deployment professional needs to run a utility to configure the existing WebSEAL with the instance of the appliance that provides the authorization server for Advanced Access Control.Which utility tool will perform this configuration?
A customer deployment consists of a large number of virtual host functions definitions. During a troubleshooting session the deployment professional realizes theWebSEAL logs do not distinguish between requests to different virtual hosts.How can this be remediated?
A company is upgrading its existing IBM Security Access Manager (ISAM) environment to ISAM 9.0. Based on the requirements for the upgrade, activation keys have been procured for different ISAM modules.Which two features require an activation key? (Choose two.)
Multiple hostnames are mapped to a single IP address used by a WebSEAL instance, listening on the default HTTPS port. For each host name requested in the browser, WebSEAL needs to present a different certificate.What can the deployment professional do to meet this requirement?
A customer has a developed an OAuth 2.0 Client application to access resources on behalf of a user. The customer states that the OAuth client has the following two constraints:1. The OAuth client is not capable of maintaining its credentials confidential for authentication with the authorization server.2. The resources owner does not have a trust relationship with the client.What is the suitable OAuth 2.0 grant type for the API Protection Policy if the user resource accessed by the OAuth 2.0 client is to be protected by IBM SecurityAccess Manager V9.0?