What is new for this release

IBM® Security Access Manager for Mobile and IBM Security Access Manager for Web provide new features and extended functions for Version 8.0.0.4.

The following sections detail the new features for Version 8.0.0.4 and earlier fix pack releases. Each fix pack includes all features that are introduced in prior fix packs.

IBM Security Access Manager for Mobile Version 8.0.0.4

This version contains the following updates for IBM Security Access Manager for Mobile:

IBM Security Access Manager for Web Version 8.0.0.4

This version contains the following updates for IBM Security Access Manager for Web:

New features that are common to both Security Access Manager V8.0.0.4 products

New features are available for appliance functions that are active for both IBM Security Access Manager for Web V8.0.0.4 and IBM Security Access Manager for Mobile V8.0.0.4

IBM Security Access Manager for Mobile Version 8.0.0.3

Version 8.0.0.3 is distributed as a fix pack on IBM Fix Central. This version contains the following updates for IBM Security Access Manager for Mobile:

IBM Security Access Manager for Mobile Version 8.0.0.1

Version 8.0.0.1 is distributed as a fix pack on IBM Fix Central. This version contains the following updates for IBM Security Access Manager for Mobile:

Support for OAuth 2.0
  • Resource protection with OAuth 2.0
    IBM Security Access Manager for Mobile supports the OAuth 2.0 protocol. The implementation of the OAuth 2.0 protocol in Security Access Manager for Mobile uses API protection definitions that define how resources are accessed.
    Note: The OAuth 2.0 implementation requires configuration before you can use it. For information, see the steps for configuring API protection in Configuring API protection.
  • PIN protection

    Security Access Manager for Mobile extends the OAuth 2.0 capability with a PIN policy. The PIN policy provides the capability of protecting a refresh token with a PIN provided by the API protection client. Support for this optional PIN protection can be used for authenticating hybrid and native mobile applications. For more information, see PIN policy.

  • Trusted clients manager

    Security Access Manager for Mobile supports user-interactive consent and auto-consent for the authorize endpoint. This consent can be configured on an API protection definition basis. For more information, see Trusted clients management.

  • User tokens and clients management

    Customizable pages are available for users to manage their tokens and consent decisions. For more information, see Managing OAuth 2.0 authorization grants.

  • JavaScript Mapping Rules

    JavaScript mapping rules for the entire token lifecycle are supported. For more information, see Managing OAuth 2.0 mapping rules.

  • Support for off-box calls

    HTTP or HTTPS POST and GET calls to external systems within JavaScript mapping rules are supported. This feature is useful in scenarios where external data sources can be consulted during OAuth token generation and validation. For more information, see OAuth 2.0 mapping rule methods.

RESTful web service policy information point (PIP)
The RESTful web service PIP returns attributes from data that is obtained from a RESTful web service hosted outside of the appliance. You can configure multiple instances of this PIP to access different web services.
Note: This PIP requires configuration before you can use it. For information, see the steps for adding a policy information point in Managing policy information points.