Showing documents 81 to 100 of 116  Previous  Next

Results per page: 5 | 10 | 20


cover image

Certification Study Guide: IBM Tivoli Identity Manager Version 5.0
Security

Redbooks, published 19 Feb 2009, last updated 23 Feb 2009

This IBM® Redbooks® publication is a study guide for the "IBM Certified Deployment Professional - IBM Tivoli® Identity Manager V5.0" certification test, test number 934, and is meant for those who want to achieve IBM Certifications for this specific product. The IBM Certified Deployment Professional - IBM Tivoli Identity Manager V5.0 certification, offered through the Professional Certification Program from IBM, is designed to validate the skills required of technical professionals who work in the implementation of the IBM Tivoli Identity Manager Version 5.0 product. This book provides a ... [more]


cover image

IBM Tivoli Security Policy Manager
Security

Redpaper, published 17 Feb 2009

In a growing number of enterprises, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals that are established and driven by the business need to be implemented, managed, and enforced by the service-oriented infrastructure (SOA) consistently. Expressing these goals as policy and effectively managing this policy is fundamental to the success of any IT and application transformation, including SOA solutions. First, a flexible policy management framework must be in place to achieve alignment with ... [more]


cover image

Deployment Guide Series: IBM Tivoli Identity Manager 5.0
Security

Redbooks, published 10 Dec 2008

Deploying an identity management solution for a medium size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, their deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an identity management implementation. This IBM® Redbooks® publication, intended for IBM Business Partners, takes a step-by-step approach to implementing an identity management solution based on IBM Tivoli® Identity Manager. Part 1 discusses the general business context and the ... [more]


cover image

Designing for Solution-Based Security on z/OS
z Systems

Redbooks, published 16 Oct 2008

This IBM Redbooks publication provides solution designers and architects with a comprehensive view of the security services they can exploit on z/OS, whether their application is hosted by z/OS or by another platform. It also discusses, at a high level, the Tivoli products that team with mainframe security services to provide flexible and extensible security architectures that fit On Demand infrastructure requirements, because implementing optimum solution-based security requires extensive knowledge of what security services and APIs provide on the platforms for which you are developing the ... [more]


cover image

Deployment Guide Series: IBM Tivoli Access Manager for e-business V6.0
Security

Redbooks, published 1 Jul 2008

Deploying an access control solution for a medium-size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, its deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an access control implementation. This IBM Redbooks publication takes a step-by-step approach to implementing an access control solution based on IBM Tivoli Access Manager for e-business. Part 1 takes you through an example company profile with existing business policies and guidelines ... [more]


cover image

Integrated Identity and Access Management Architectural Patterns
Security

Redpaper, published 29 May 2008

Customers implement an integrated Identity and Access Management (IAM) solution to address many business requirements. The overall driving requirement is to provide a combination of business processes and technologies to manage and secure access to the information and resources within the organization. Towards addressing this overall goal, the IAM solution first needs to provide a method of granting users access to applications and systems across the enterprise that they need to perform their jobs. Second, it needs the capability to authorize proper access levels to resources based on ... [more]


cover image

Understanding SOA Security Design and Implementation
Security

Redbooks, published 8 Nov 2007, last updated 29 May 2008

Securing access to information is important to any business. Security becomes even more critical for implementations structured according to Service-Oriented Architecture (SOA) principles, due to loose coupling of services and applications, and their possible operations across trust boundaries. To enable a business so that its processes and applications are flexible, you must start by expecting changes – both to process and application logic, as well as to the policies associated with them. Merely securing the perimeter is not sufficient for a flexible on demand business. In this IBM ... [more]


cover image

Identity Management Advanced Design for IBM Tivoli Identity Manager
Security

Redbooks, published 28 Aug 2006, last updated 22 May 2008

Identity and user lifecycle management projects are being deployed more and more frequently - and demand is growing. By demonstrating how IBM Tivoli Identity Manager can be made resilient and adapted to special functional requirements, this IBM Redbooks publication creates or enhances confidence in the IBM Tivoli Identity Manager-based solution for senior management, architects, and security administrators. Advanced design topics can start with infrastructure availability for all involved components, Web application, and database server clustering as well as LDAP multi-master setups, ... [more]


cover image

Federated Identity and Trust Management
Security

Redpaper, published 15 May 2008

This IBM Redpaper discusses the IBM Tivoli software strategy and roadmap for a consistent, unified, and evolutionary approach to securing cross-enterprise e-business solutions. Built on open security standards, with tight integration to Web middleware (Java 2 Platform Enterprise Edition (J2EE) and Microsoft .NET), Tivoli security solutions allow you to increase the reach of your business. They build on existing Web security investments that can quickly evolve to take advantage of web services and federation ... [more]


cover image

IBM WebSphere DataPower SOA Appliances Part II: Authentication and Authorization
Application Integration

Redpaper, published 1 Apr 2008

IBM® WebSphere® DataPower® SOA Appliances represent an important element in the holistic approach of IBM to service-oriented architecture (SOA). IBM SOA appliances are purpose-built, easy-to-deploy network devices that simplify, secure, and accelerate your XML and Web services deployments while extending your SOA infrastructure. These appliances offer an innovative, pragmatic approach to harness the power of SOA. By using them, you can simultaneously use the value of your existing application, security, and networking infrastructure investments. This series of IBM Redbooks publications is ... [more]


cover image

IBM WebSphere DataPower SOA Appliances Part III: XML Security Guide
Application Integration

Redpaper, published 1 Apr 2008

IBM® WebSphere® DataPower® SOA Appliances represent an important element in the holistic approach of IBM to service-oriented architecture (SOA). IBM SOA appliances are purpose-built, easy-to-deploy network devices that simplify, help secure, and accelerate your XML and Web services deployments while extending your SOA infrastructure. These appliances offer an innovative, pragmatic approach to harness the power of SOA. By using them, you can simultaneously use the value of your existing application, security, and networking infrastructure investments. This series of IBM Redbooks publications ... [more]


cover image

IBM Tivoli Configuration Manager and Tivoli Provisioning Manager for Software Coexistence and Migration Considerations
Security

Redbooks, published 16 Nov 2007

This IBM® Redbooks® publication focuses on migration of a data center from a Tivoli® Framework environment and a Tivoli Configuration Manager-based management model to the new Service-Oriented Architecture (SOA), provided by Tivoli Provisioning Manager for Software V 5.1. In addition to migration, we also discuss the coexistence environment, where Tivoli Provisioning Manager for Software drives the Tivoli Management Framework environment. Because Tivoli Provisioning Manager for Software shares its roots with Tivoli Provisioning Manager 5.1, all of the migration scenarios we describe in this ... [more]


cover image

Enterprise Security Architecture Using IBM Tivoli Security Solutions
Security

Redbooks, published 7 Aug 2007

This IBM Redbooks publication reviews the overall Tivoli Enterprise Security Architecture. It focuses on the integration of audit and compliance, access control, identity management, and federation throughout extensive e-business enterprise implementations. The available security product diversity in the marketplace challenges everyone in charge of designing single secure solutions or an overall enterprise security architecture. With Access Manager, Identity Manager, Federated Identity Manager, Security Compliance Manager, Security Operations Manager, Directory Server, and Directory ... [more]


cover image

Reverse Password Synchronization with IBM Tivoli Identity Manager
Security

Redpaper, published 11 May 2007, last updated 14 May 2007

This IBM Redpaper describes how the IBM Tivoli Identity Manager Reverse Password Synchronization mechanism works. This mechanism is used by most clients as a vital component of their Tivoli Identity Manager deployment, but there are areas where this mechanism could be better documented. This IBM Redpaper aims to provide a comprehensive technical guide to this key component of Tivoli Identity Manager. This document focuses on the Windows Reverse Password Synch modules, because they are the most deployed. But it also covers the other modules and the password synchronization provided through ... [more]


cover image

Introduction to the New Mainframe: Security
z Systems

Redbooks, published 3 Apr 2007, last updated 26 Apr 2007

This book provides students of information systems with the background knowledge and skills necessary to begin using the basic security facilities of IBM System z. It enables a broad understanding of both the security principles and the hardware and software components needed to insure that the mainframe resources and environment are secure. It also explains how System z components interface with some non-System z components. A multi-user, multi-application, multi-task environment such as System z requires a different level of security than that typically encountered on a single-user ... [more]


cover image

Securing DB2 and Implementing MLS on z/OS
z Systems

Redbooks, published 4 Apr 2007

Today's computing environment is subject to increasing regulatory pressures and potentially malicious attacks. Regulatory compliance, security, and audit are in the daily headlines and growing more prominent.The security of the information to which you have been entrusted has never been more critical. The reality of compliance is too complex. Compliance demands that you work carefully to set up a strong, comprehensive set of policies and controls. That means controls that consider operational data, financial data, unstructured data, spreadsheets, e-mail, and business intelligence data. We ... [more]


cover image

z/OS UNIX Security Fundamentals
z Systems

Redpaper, published 5 Feb 2007

This IBM Redpaper introduces the z/OS UNIX security model and implementation to MVS knowledgeable and security-minded users. It does not address in detail all the wealth of specific security features available in z/OS UNIX, but rather the base principles of operation and the mechanisms implementation with setup recommendations. We assume that the user already has a knowledge of the most commonly used IBM Resource Access Control Facility (RACF) setups and commands. However, we do not provide detailed procedures and explanations about the use of these ... [more]


cover image

Encryption Facility for z/OS Version 1.10
z Systems

Redbooks, published 23 Jan 2007

This IBM Redbooks publication introduces IBM Encryption Facility for z/OS, Program Product 5655-P97, from the description of its principles of operation to information related to its setup intended for system programmers and security officers. We include recommendations, based on our own experience, in the chapters addressing these topics, including warnings and explanations about problems we discovered during our own trials. This book provides also several examples of the use of the following Encryption Facility for z/OS features:
- Encryption Services
- Encryption Facility ... [more]


cover image

Understanding LDAP - Design and Implementation
Security

Redbooks, published 16 Jun 2004, last updated 19 Jul 2006

The implementation and exploitation of centralized, corporate-wide directories are among the top priority projects in most organizations. The need for a centralized directory emerges as organizations realize the overhead and cost involved in managing the many distributed micro and macro directories introduced in the past decade with decentralized client/server applications and network operating systems. Directories are key for successful IT operation and e-business application deployments in medium and large environments. IBM understands this requirement and supports it by providing ... [more]


cover image

WebSphere Application Server on z/OS and Security Integration
Application Platform

Redpaper, published 5 Jul 2006

This IBM Redpaper addresses the need for information in the area of integrating security between WebSphere Application Server on z/OS and the outside world. In most cases, multiple security registries exist within a company with a different scheme of identities. This is even more likely in companies using z/OS. There are basically two “worlds”: the z/OS (RACF) world in which identities and their authorizations are kept in RACF and the outside world where identities and their authorizations are kept in LDAP, Microsoft Active Directory, or equivalent solutions. In an e-business environment, ... [more]


The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. Most of these publications are available in Adobe PDF format and may be viewed online or downloaded for offline viewing and printing. Read our How to buy page for details on how to order a bound hardcopy.



Follow IBM Redbooks

Follow IBM Redbooks