The API protection uses the OAuth 2.0 protocol. To configure
the API protection, you must create a definition and a client.
You must then attach the API protection definition to a resource.
Creating API protection definition
Create API protection definitions to configure the settings
that dictate the behavior of how resources are accessed. The configuration
settings protect the resources from unauthorized access.
PIN policy
IBM Security Access Manager for Mobile extends OAuth 2.0
capabilities with a PIN policy.
Registering an API protection client
Register OAuth API protection clients in the Clients panel.
Clients are the entities against which OAuth access and refresh tokens
are granted at runtime.