Articles & Content

Henrik Loeser: Thoughts on IT, Life, DB2, and More

IT Professional (IBM), Information Management Architect / DB2 pureXML / Database Kernel Developer, spent 7 years living in California (Bay Area), now back in Germany, living in a passive house in Friedrichshafen

Note: The content of this blog is the opinion and thoughts of the blogger and does not necessarily represent the opinions of IDUG.

 

 
My passwordless app on IBM Cloud thanks to FIDO2Passwordless login for cloud appIn my recent post I discussed how I could use a FIDO2 dongle as second factor for an app on IBM Cloud. Today, I want to give you an update because I managed to go passwordless. With the latest October update Cloud Identity started to offer passwordless login with eith…
Quick notes on using FIDO2 security keys on LinuxUsing FIDO2 keys for 2FAMost of you know that I am using a Linux laptop. Thus, experimenting with FIDO2 hardware security keys as discussed in the earlier blog post requires some extra setup. But fortunately, most steps are documented somewhere and can be easily found. Here is my writeup for my own …
Using your FIDO2 key for 2FA on IBM Cloud appsArchitecture: End-to-end securityLast week I read the blog on how to protect cloud apps with App ID by using the IBM Cloud Identity user directory. That blog discusses how to configure IBM Cloud Identity as SAML-based identity source for IBM Cloud App ID. Because Cloud Identity supports FIDO2 device…
New tutorial discuss how to enhance cloud app securityRecently, I wrote a new tutorial as part of the IBM Cloud solution tutorials. Have you already developed and deployed an application on IBM Cloud? Then, may be, you followed the introductory tutorial on how to apply end-to-end security to an application. Following "security by design," you are now s…
Trip report: Sustainability management and reportingLast Friday, I attended the annual conference of the Bodensee Innovation Cluster for digital change (changes due to digitalization). The conference had several interesting talks and included workshops. Let me give you a quick overview of the innovation cluster, then delve into the sustainability top…
Updated: Cloud App Security - an introductionIBM Cloud offers security servicesTwo years back, I had created two blog articles providing an introduction to cloud app security with an overview of topics, then discussing details on how to implement those security requirements with (then) Bluemix services. Recently, I had some time to update look…
Track API key usage by combining IBM Cloud IAM and LogDNA searchWhich key is still in use...?Recently, I blogged about tracking account activity from the command line. I showed you how to search IBM Cloud Activity Tracker with LogDNA records using a Python script. Today, I discuss how to combine the IAM Identity Services API with the LogDNA search to track usage…
Offboarding on IBM Cloud: Considerations when removing a userOnly authorized persons have accessOver my past blog posts I have looked into how to rotate credentials in different compute environments. I looked at Cloud Foundry on IBM Cloud, Cloud Functions and Kubernetes. The background is that I wanted to understand what it takes to maintain security during t…
Get some REST with Db2Db2 has a REST APIMany of the IBM Cloud services have a REST API, an overview of REST APIs is here in the IBM Cloud docs. Recently, I realized that I had not yet tried the Db2 on Cloud API and the API for Db2 Warehouse on Cloud. Thus, last Friday I took some time to test out some code using one of m…
Track it from the command line: Search audit events in LogDNA using PythonTake a look at security logsEarlier this year, IBM and LogDNA announced an integrated offering Activity Tracker with LogDNA. It allows to manage and search activity events in LogDNA instances on IBM Cloud. There are IAM, account management and all kinds of service instance events that can be tracked…