The request in a customer environment is IDP Initiated unsolicited SSO. The initial URL is:
https://POCIDP/FIM/sps/saml2idp/saml20/loginitial?
RequestBinding =HTTPPost&PartnerId= https://POCSP/isam/sps/abc/saml20&NameIdFormat =Email
The POCIDP is Point of Contact for Identity Provider and POCSP is Point of Contact for Service Provider. The customer wants to configure TargetURL within the
Service Provider Federation configuration in IBM Security Access Manager V9.0.
What will satisfy this requirement?
An IBM Security Access Manager (ISAM) V9.0 environments is configured with Primary and Secondary Masters servers. The Primary master node becomes unavailable and ISAM deployment professional promotes the Secondary Master node to a Primary Master. What happens to the original Primary Master when it becomes available and rejoins the network?
A deployment professional has created an Access Control Policy to protect sensitive business information: Which Policy decision is returned for a user with a risk score of 35 and has consented to registering a device?
An IBM Security Access Manager (ISAM) V9.0 deployment professional has downloaded a snapshot from an ISAM virtual appliance configured with reverse proxy. This snapshot is being applied to another virtual appliance. Which condition must be met before applying a snapshot from one virtual appliance to another?
Multiple users are complaining about being denied access to resources they believe they are entitled to see. The IBM Security Access Manager (ISAM) V9. deployment professional needs to understand and troubleshoot the various access control constructs in the ISAM protected object space. The deployment professional must also understand the order of evaluation of the three major access control constructs available in the Policy Administration tool. That is the correct order of evaluation for these constructs?
A deployment professional has created a new SAML 2.0 Service Provider federation and added an Identity Provider partner. What will be the next step to allow users to single sign-on to the service?
An IBM Security Manager V9.0 deployment professional responsible for a large cluster notices the clocks among the nodes are not in sync and needs to update settings to ensure the clocks are synchronized. Which setting should be used to help keep times synchronized?
In a Web Commerce environment, a "/shoppingcart" junction with four back-end application servers is created on the IBM Security Access Manager V9.0 Web Reverse Proxy. The back-end servers are not using session replication. Which action is appropriate for maintaining session state when creating the junction?
A company is planning to deploy an IBM Security Access Manager (ISAM) V9.0 cluster to provide high availability services to its customer. ISAM cluster members are separated by a firewall. Which port(s) should be open in the firewall to assure normal cluster service functionality?