{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"isam-support","owner":"IBM-Security","isFork":false,"description":"ISAM Level II Support Diagnostic Tools, Configuration Examples, and Best-Practices.","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":4,"starsCount":18,"forksCount":27,"license":null,"participation":[0,3,2,0,1,0,0,3,3,2,0,0,0,0,0,0,1,0,0,0,0,7,10,0,0,1,0,0,0,0,1,0,0,2,0,0,4,0,3,0,0,0,0,0,0,0,0,0,0,11,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-01T21:45:51.919Z"}},{"type":"Public","name":"isam-civ-integration","owner":"IBM-Security","isFork":false,"description":"An out-of-band location of CIV integration mapping rules and other items.","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":4,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:00:56.172Z"}},{"type":"Public","name":"verify-access-aac-authentication-policies","owner":"IBM-Security","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":1,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,11,3,0,0,0,2,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-08T05:34:25.514Z"}},{"type":"Public","name":"Verify-Bridge-Authentication-Sample-App","owner":"IBM-Security","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":1,"issueCount":0,"starsCount":1,"forksCount":2,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-12T06:56:16.680Z"}},{"type":"Public","name":"adaptive-browser-sdk","owner":"IBM-Security","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":2,"issueCount":0,"starsCount":2,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-02T00:33:47.532Z"}},{"type":"Public","name":"verify-access-aac-mapping-rules","owner":"IBM-Security","isFork":false,"description":"A repository for out-of-band updates to AAC Mapping Rules from Verify Access","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":4,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-12-18T00:42:17.973Z"}},{"type":"Public","name":"verify-sdk-javascript","owner":"IBM-Security","isFork":false,"description":"The repository for integrating web applications to the IBM Cloud Verify platform.","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":6,"issueCount":0,"starsCount":10,"forksCount":8,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-28T00:17:36.569Z"}},{"type":"Public","name":"CI-SAML-Sample","owner":"IBM-Security","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":2,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-05-19T05:52:44.901Z"}},{"type":"Public","name":"CI-ldapproxy","owner":"IBM-Security","isFork":false,"description":"A nodejs based ldapproxy to the CI web services.","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-17T23:07:50.267Z"}},{"type":"Public","name":"carbon-tutorial","owner":"IBM-Security","isFork":true,"description":"An app for the Carbon Design System tutorial","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":8,"issueCount":0,"starsCount":0,"forksCount":4251,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-17T22:57:18.480Z"}},{"type":"Public","name":"adaptive-proxy-sdk-javascript","owner":"IBM-Security","isFork":false,"description":" This library is to provide an interface for device authentication, authorization, and risk assessment using IBM Security Verify.","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":2,"issueCount":0,"starsCount":0,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-17T22:49:14.330Z"}},{"type":"Public","name":"isv-node-tools","owner":"IBM-Security","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-07-30T16:23:30.814Z"}}],"repositoryCount":12,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"IBM-Security repositories"}