Search for tag: "gateway"
Secure your APIs end-to-endLearn why a holistic API security strategy is critical to ensuring your APIs are protected not only from misconfigurations and vulnerabilities, but from more advanced malicious attacks. See both… |
|
JSON Web Tokens (JWT) Demo using CICS Transaction GatewayIn this demo, we walk through the JWT feature implementation using CICS Transaction Gateway 9.3. |
|
zAPM Connect with CICS Transaction Gateway 9.3zAPMConnect is a monitoring tool designed to integrate with various application performance management vendors. It provides tracking support for various methods of calling into CICS including http.… |
|
Chatmantics: From concept to production in 3 months on IBM CloudChatmantics develops virtual assistants to help call centers improve service, sales, and customer acquisition. By integrating IBM® Voice Agent with Watson™, on IBM Cloud, into its… |
|
How IBM DataPower Secures APIs, Mobile, Cloud and MoreFrom mobile to the Internet of Things, there's no shortage of new channels needed to reach your customers. The speed needed to get on these channels shouldn't strip away your security.… |
|
Delphi Automotive efficiently integrates internal and external systems globallyDelphi Automotive migrates its massive integration portfolio, including an SAP system through which 80% of its business runs, to an IBM integration platform, providing immediate business stability… |
|
Enhanced web application support for multi-protocol gatewayEnhanced web application support for multi-protocol gateway - Links embedded in this video (open in new tab): Slide 11: HTTP 1.1 , RFC 2616: Slide 30: Check Technote regarding Matching Rule's…
From IBM Training
|
|
Usability and web GUIUsability and web GUI - Links embedded in this video (open in new tab): Slide 32: This module is also available in PDF - 60DataPower_WebGui.pdf
From IBM Training
|
|
SSL proxy serviceSSL proxy service - Links embedded in this video (open in new tab): Slide 5: This module is also available in PDF - 60DataPower_SSLProxyService.pdf
From IBM Training
|
|
TLS 1.1 and TLS 1.2 support and Kerberos constrained delegation supportTLS 1.1 and TLS 1.2 support and Kerberos constrained delegation support - Links embedded in this video (open in new tab): Slide 9: This module is also available in PDF - 60DataPower_SSL_Kerberos.pdf
From IBM Training
|
|
Standby control and self balancing enhancementsStandby control and self balancing enhancements - Links embedded in this video (open in new tab): Slide 8: This module is also available in PDF - 60DataPower_SelfBalancing.pdf
From IBM Training
|
|
OAuth 2.0 enhancementsOAuth 2.0 enhancements - Links embedded in this video (open in new tab): Slide 20: This module is also available in PDF - 60DataPower_OAuth.pdf
From IBM Training
|
|
Web services management and monitoringWeb services management and monitoring - Links embedded in this video (open in new tab): Slide 22: For additional information - DataPower information center: Slide 23: This module is available in…
From IBM Training
|
|
Improved load balancer group health checksImproved load balancer group health checks - Links embedded in this video (open in new tab): Slide 11: This presentation is available in PDF - 60Datapower_LBG_Health_Checks.pdf
From IBM Training
|
|
JSON schema validationJSON schema validation - Links embedded in this video (open in new tab): Slide 3: (Based on http://json-schema.org/address) Slide 4: (From http://json-schema.org/address) Slide 6: $ref Slide 6:…
From IBM Training
|
|
IBM Security Access Manager for DataPower Release 6.0.0IBM Security Access Manager for DataPower Release 6.0.0 - Links embedded in this video (open in new tab): Slide 10: This module is available in PDF format - 60DataPower_ISAM.pdf
From IBM Training
|