talk-data.com talk-data.com

J

Speaker

Jani Perttila

2

talks

author

Frequent Collaborators

Filter by Event / Source

Talks & appearances

2 activities · Newest first

Search activities →
Deployment Guide Series: IBM Tivoli Identity Manager 5.0

Deploying an identity management solution for a medium size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, their deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an identity management implementation. This IBM® Redbooks® publication, intended for IBM Business Partners, takes a step-by-step approach to implementing an identity management solution based on IBM Tivoli® Identity Manager. Part 1 discusses the general business context and the planning approach for an identity management solution. Part 2 takes you through an example company profile with existing business policies and guidelines and builds an identity management solution design for this particular environment. We describe how the components can be integrated into the existing environment. Then, we focus on the detailed configuration of identity management integration tasks that must be implemented in order to create a fully functional end-to-end solution. This IBM Redbooks publication does not introduce any general identity management concepts, nor does it systematically explain all of Tivoli Identity Manager's components and capabilities; instead, those details are thoroughly discussed in the IBM Redbooks publications: Identity Management Design Guide with IBM Tivoli Identity Manager, SG24-6996, and Enterprise Security Architecture Using IBM Tivoli Security Solutions, SG24-6014.

Enterprise Business Portals with IBM Tivoli Access Manager

Mastering the IBM Tivoli Access Manager is the most important factor for successfully deploying contemporary e-business solutions. Access Manager is the key element in an e-business security framework that needs thorough understanding to achieve maximum security, functionality, and performance. Based on expandable security policies for users, groups, and protected resources, the Tivoli Access Manager manages the authentication and authorization to application servers, Web sites, and virtually any other resource that requires protection, including custom-written applications. This IBM Redbooks publication explains the planning steps and describes how to build multi-level enterprise business portals with the new Tivoli Access Manager Version 3.9. It also discusses high-availability scenarios and platform coverage for various involved components like Web servers, registries, and Access Manager management components. It shows the integration of Access Manager into the IBM WebSphere Application Server, IBM WebSphere Everyplace Suite, BEA WebLogic application server, Siebel, and other products. This book is a valuable resource for security administrators and architects who wish to understand and implement a centralized security infrastructure.