A customer would like to give third-party applications scoped access to a protected resource on behalf of the resource owner. What is the appropriate protocol?
In reviewing a IBM WebSphere Application Server IBM Tivoli Federated Identity Manager V6.2.2 diagnostic trace, which object type should be examined to
determine how successive processing steps act upon the transaction information?
Assume IBM Tivoli Federated Identity Manager V6.2.2 (TFIM) is installed in a clustered IBM WebSphere Application Server (WAS) environment. What is a concern
with WAS TFIM runtime diagnostic trace analysis for Federated Single Sign-On (FSSO)?