By default the IBM Security Access Manager (ISAM) reverse proxy (or ‘WebSEAL’) writes request data to the file ‘request.log’: when the file size reaches 2 MB a fresh file is created, and there is no limit to the number of request log files that areRead More
I’m really impressed with the iCorrect Mobile Phone Repair Shop in London (near Oxford Circus/Tottenham Court Road). Recently they fitted a new battery to my iPhone 5, at a cost of £35 (including a two year warranty). And a while ago I had a problem whenRead More
April 2016: I now advocate a different approach to solving this problem – see my update at https://vaughanharper.com/2016/04/28/solution-to-an-hdmi-problem-v2/ .
I recently got a Marantz AV receiver, but I had an annoying problem connecting my MythTV system to the television through it: things are fine if, when I boot
We know that an IBM Security Access Manager (ISAM) physical appliance has six Ethernet ports – but which port is which when it shows in the admin console? Especially as the distinction between Management ports and Application ports has effectively gone away.
Assuming that you are
Most of my work with IBM Security Access Manager (ISAM) has been with virtual appliances, but earlier this year I had the opportunity to set up an ISAM Version 8 hardware/physical appliance. So the question is: how do you connect to the console of aRead More
I was surprised to discover how upset I was recently when I went into Shazam on my mobile phone and discovered that for some reason all of my Tags had been wiped. I had been travelling and heard some interesting new artists that I’d beenRead More
I came across an interesting problem recently with an IBM Security Access Manager (ISAM)/WebSEAL junction: whenever requests were sent to the back-end server (IIS) we received an ‘HTTP 400 – Bad Request – Invalid Hostname’ error.
Looking at the pdweb.debug log showed that the requests contained
IBM Security Access Manager (ISAM) supports Kerberos constrained delegation single sign-on (SSO) for users in multiple Windows domains – in other words, ISAM is able to talk to Active Directory to obtain a Kerberos credential on behalf of a user, which it then presents toRead More
I’m hoping to include various snippets of technical information that will be of use to people, either related to my work (as a Security Specialist with IBM) or else related to my hobby projects (such as MythTV). So here goes with a fairly trivial point, butRead More