While working with DataPower and Active Directory (acting as the User Repository) I have often run into situation where AD[…]
Read moreAuthor: Robert Broeckelmann
Some Simple Updates To A DataPower XSLT stylesheet.
In the last post, we saw how an XML Firewall in loopback mode could be used to return a valid[…]
Read moreSOAP Web Service Mockup tutorial on DataPower
It is often the case that a DataPower developer will have work to do, but does not yet have a[…]
Read moreJBoss/PicketLink WS-Trust Client and Third-Party Security Token Services
Another use-case that I touched on during my JBoss World 2012 presentation was using the PicketLink WS-Trust Client implementation to[…]
Read moreJBoss and LTPAv2 support
I’ve been at a couple of different client sites where there was a heavy IBM product presence, the use of[…]
Read moreDataPower Access Rental—Maybe DataPower in the Cloud?
Ever since I was first started working with IBM WebSphere DataPower I was looking around for someone that was offering[…]
Read moreJBoss World 2012 Session–Trusted Security with JBoss Enterprise Application Platform
It’s been a few weeks since I have posted any updates. I started a new project at the beginning of[…]
Read moreFine Grained Authorization versus Coarse Grained Authorization
I was recently involved in a conversation where someone asked the question what is FGA (Fine Grained Authorization) versus Coarse[…]
Read moreRBM–Administrative Access & Security for DataPower
I generally recommend to clients that DataPower RBM (Role-Based Management) be configured to perform authentication and authorization of DataPower administrators[…]
Read moreDataPower Appliances & HSMs
I’ve been in a couple of shops that have used the HSM module option of DataPower for FIPS 140-2 v2[…]
Read more