The request in a customer environment is IDP Initiated unsolicited SSO. The initial URL is: https://POCIDP/FIM/sps/saml2idp/saml20/loginitial?RequestBinding =HTTPPost&PartnerId= https://POCSP/isam/sps/abc/saml20&NameIdFormat =EmailThe POCIDP is Point of Contact for Identity Provider and POCSP is Point of Contact for Service Provider. The customer wants to configure TargetURL within theService Provider Federation configuration in IBM Security Access Manager V9.0.What will satisfy this requirement?
The IBM Security Manager V9.0 Advances Access Control module can perform Context-based Authorization based on the contents of a POST parameter.Which two configuration steps need to be performed to do this? (Choose two.)
An IBM Security Access Manager (ISAM) V9.0 environments is configured with Primary and Secondary Masters servers. The Primary master node becomes unavailable and ISAM deployment professional promotes the Secondary Master node to a Primary Master.What happens to the original Primary Master when it becomes available and rejoins the network?
A deployment professional has created an Access Control Policy to protect sensitive business information:Which Policy decision is returned for a user with a risk score of 35 and has consented to registering a device?
A part of installing a fixpack a deployment professional wants to back up the appliance configuration.How is this done?
A customer has a developed an OAuth 2.0 Client application to access resources on behalf of a user. The customer states that the OAuth client has the following two constraints:1. The OAuth client is not capable of maintaining its credentials confidential for authentication with the authorization server.2. The resources owner does not have a trust relationship with the client.What is the suitable OAuth 2.0 grant type for the API Protection Policy if the user resource accessed by the OAuth 2.0 client is to be protected by IBM SecurityAccess Manager V9.0?