Showing documents 101 to 120 of 120  Previous

Results per page: 5 | 10 | 20


cover image

Encryption Facility for z/OS Version 1.10
IBM Z

Redbooks, published 23 Jan 2007

This IBM Redbooks publication introduces IBM Encryption Facility for z/OS, Program Product 5655-P97, from the description of its principles of operation to information related to its setup intended for system programmers and security officers. We include recommendations, based on our own experience, in the chapters addressing these topics, including warnings and explanations about problems we discovered during our own trials. This book provides also several examples of the use of the following Encryption Facility for z/OS features:
- Encryption Services
- Encryption Facility ... [more]


cover image

Understanding LDAP - Design and Implementation
Security

Redbooks, published 16 Jun 2004, last updated 19 Jul 2006

The implementation and exploitation of centralized, corporate-wide directories are among the top priority projects in most organizations. The need for a centralized directory emerges as organizations realize the overhead and cost involved in managing the many distributed micro and macro directories introduced in the past decade with decentralized client/server applications and network operating systems. Directories are key for successful IT operation and e-business application deployments in medium and large environments. IBM understands this requirement and supports it by providing ... [more]


cover image

WebSphere Application Server on z/OS and Security Integration
Application Platform

Redpaper, published 5 Jul 2006

This IBM Redpaper addresses the need for information in the area of integrating security between WebSphere Application Server on z/OS and the outside world. In most cases, multiple security registries exist within a company with a different scheme of identities. This is even more likely in companies using z/OS. There are basically two “worlds”: the z/OS (RACF) world in which identities and their authorizations are kept in RACF and the outside world where identities and their authorizations are kept in LDAP, Microsoft Active Directory, or equivalent solutions. In an e-business environment, ... [more]


cover image

Deployment Guide Series: IBM Tivoli Provisioning Manager Express V4.1 for Software Distribution
Security

Redbooks, published 26 May 2006, last updated 31 May 2006

IBM Tivoli Provisioning Manager Express Version 4.1 for Software Distribution is an easy-to-use, comprehensive solution for software distribution, patch, inventory, and asset management. This Web-based solution is designed for ease of use and implementation so that you can quickly begin to manage the PCs in your enterprise. IBM Tivoli Provisioning Manager Express V4.1 for Software Distribution is implemented with both a client agent on the managed PCs and a centralized data repository. The product is specifically targeted for the small-to-medium business (SMB) market. This IBM Redbooks ... [more]


cover image

Robust Data Synchronization with IBM Tivoli Directory Integrator
Security

Redbooks, published 26 May 2006

Don’t be fooled by the name; IBM Tivoli Directory Integrator integrates anything, and it is not in any way limited to directories. It is a truly generic data integration tool that is suitable for a wide range of problems that usually require custom coding and significantly more resources to address with traditional integration tools. This IBM Redbooks publication shows you how Directory Integrator can be used for a wide range of applications utilizing its unique architecture and unparalleled flexibility. We discuss the business context for this evolutionary data integration and tell you how ... [more]


cover image

Deployment Guide Series: Tivoli Continuous Data Protection for Files
Security

Redbooks, published 18 May 2006

Tivoli Continuous Data Protection for Files is specifically targeted at end user computers, such as mobile computers and workstations, as well as file servers. It provides continuous data protection of files, providing the highest level of protection possible, yet is simple to use and administer. When files change, Tivoli Continuous Data Protection for Files will make up to three copies of the file (or queue copies to be made later). This IBM Redbooks publication presents a deployment guide for Tivoli Continuous Data Protection for Files. We cover planning, installing, and troubleshooting of ... [more]


cover image

Certification Study Guide: IBM Tivoli Access Manager for e-business 6.0
Security

Redbooks, published 27 Feb 2006

This IBM Redbooks publication is a study guide for IBM Tivoli Access Manager for e-business Version 6 and is meant for those who want to achieve IBM Certifications for this specific product. The IBM Tivoli Access Manager for e-business Certification, offered through the Professional Certification Program from IBM, is designed to validate the skills required of technical professionals who work in the implementation of the IBM Tivoli Access Manager for e-business Version 6 product. This book provides a combination of theory and practical experience needed for a general understanding of the ... [more]


cover image

Deploying Applications Using IBM Rational ClearCase and IBM Tivoli Provisioning Manager
Security

Redpaper, published 21 Nov 2005

This IBM Redpaper presents a simplified customer environment in which we demonstrate a case study for provisioning applications developed using IBM Rational ClearCase. This paper focuses on the tasks required for planning, implementing, and configuring all components of IBM Tivoli Provisioning Manager for dynamic provisioning of applications directly from the IBM Rational ClearCase software repository to a target server. The following topics are discussed: - Scenario overview - Scenario implementation overview - Setting up IBM Rational ClearCase software repository - Data Center modeling - ... [more]


cover image

Federated Identity Management and Web Services Security with IBM Tivoli Security Solutions
Security

Redbooks, published 3 Nov 2005

Today, companies have no way to trust identities belonging to their partners, suppliers, contracts and their outsourcers. This lack of trust means companies end-up creating online identities (and passwords) for all users. This approach is very costly, inefficient, and creates user frustration with multiple accounts and registrations for each Web Site. Federation is the set of business and technology agreements as well as policies that enable companies to optimally pursue business automation goals that best align with their business model, IT policies, security and privacy goals and ... [more]


cover image

Distributed Security and High Availability with Tivoli Access Manager and WebSphere Application Server for z/OS
Security

Redbooks, published 12 Sep 2005

Integrating an IBM WebSphere Application Server for z/OS cluster with IBM Tivoli Access Manager is challenging. Tailoring the business this way allows administrators to facilitate the best of both worlds, so they can focus WebSphere Application Server as a Java environment provider and Tivoli Access Manager as a security policy enforcer. This IBM Redbooks publication gives you a broad understanding of how you can enforce security for IBM WebSphere Application Server on z/OS, by using IBM Tivoli Access Manager on a distributed platform. It explains how you can achieve security, scalability, ... [more]


cover image

WebSphere Security Fundamentals
Application Platform

Redpaper, published 1 Apr 2005

This IBM Redpaper is an overview of IT security for WebSphere products. Its purpose is to provide basic information about IT security and specific details about WebSphere security. This can be used as a standalone paper with information for basic security, or considered the introduction for WebSphere V6 Security and future security-related Redbooks. Chapter 1, “Security fundamentals” discusses basic IT security without reference to any product. Chapter 2, “Supporting security components for WebSphere” starts introducing IT components related to security without specifying product names. ... [more]


cover image

WebSphere Portal Collaboration Security Handbook
Digital Experience

Redbooks, published 22 Dec 2004

Security is the hottest topic in the current Web-centric computing environment. This issue becomes the single largest concern for IT professionals who are stakeholders for Web applications, such as administrators, programmers, and users. In this IBM Redbooks publication, we discuss this security issue with the implementation of IBM WebSphere Portal Extend for Multiplatforms in an IBM Lotus collaborative environment. This discussion is scenario-based and aims to assist in the deployment of WebSphere Portal with Lotus Collaborative Components in a secure implementation. We describe several ... [more]


cover image

IBM eServer zSeries 990 (z990) Cryptography Implementation
IBM Z

Redbooks, published 5 Aug 2004

The IBM z990 includes both standard cryptographic hardware and optional cryptographic features, to give flexibility and growth capability. IBM has a long history of providing hardware cryptographic solutions, from the development of Data Encryption Standard (DES) in the 1970s to delivering the only integrated cryptographic hardware in a server to achieve the US Government's highest FIPS 140-2 Level 4 rating for secure cryptographic hardware. This IBM Redbooks publication is designed to help you understand and implement the z/OS Cryptographic PCIXCC and PCICA cards. Although this book focuses ... [more]


cover image

Using LDAP for Directory Integration
Security

Redbooks, published 12 Feb 2004

Directories are key for a successful IT operation and e-business application deployments in medium and large environments. IBM understands this requirement and supports it by providing directory implementations based on industry standards at no additional cost on all its major platforms and even on important non-IBM platforms. The IBM Directory Server implements the Lightweight Directory Access Protocol (LDAP) standard that has emerged quickly in the past years as a result of the demand for such a standard. We concentrate on some advanced LDAP tasks, such as referrals and schema ... [more]


cover image

Implementing PKI Services on z/OS
IBM Z

Redbooks, published 11 Feb 2004

This IBM Redbooks publication is designed to help you understand and implement Public Key Infrastructure (PKI) Services on z/OS. As an overview of PKI Services on z/OS, this book looks into two different ways of installing PKI Services: the traditional step-by-step configuration that you do yourself, and by using the new IKYSETUP configuration utility, which enables you to enter certain parameters and then run IKEYSETUP to configure PKI Services for you. We also look at the PKI exit and show an example of this. A chapter about PKI Services and the Cryptographic Coprocessor discusses the ... [more]


cover image

Security Configuration in a TCP/IP Sysplex Environment
IBM Z

Redbooks, published 13 May 2003

This IBM Redbooks publication will help those Parallel Sysplex installations that are considering serving users over non-secure TCP/IP networks, such as the Internet, to achieve a broad understanding of the threats to their security. It offers configuration design considerations to keep the related risks at a minimum. The following areas are discussed: - Utilization of z/OS® UNIX System Services and the relevant security setups - The Parallel Sysplex physical configurations as scrutinized from the security aspect - Exploitation and protection of the sysplex coupling mechanisms - Utilization ... [more]


cover image

zSeries Crypto Guide Update
IBM Z

Redbooks, published 11 Apr 2003

This IBM Redbooks publication is designed to help you understand and implement the z/OS Cryptographic PCICC and PCICA cards. Although this book focuses on the enablement of the z/OS PCICC and PCICA products, cryptography and the available services on z/OS are also discussed and explained, with special attention given to the new Trusted Key Entry (TKE 3.1) workstation. In addition, we look at how Linux for zSeries supports the exploitation of the PCICC and PCICA cryptographic coprocessors by using a generic device driver called z90crypt, which routes the cryptographic work to the PCICC or ... [more]


cover image

CA-ACF2 to OS/390 Security Server Migration Guide
z Systems Software

Redbooks, published 11 Oct 2000

CA-ACF2 and the OS/390 Security Server are both sophisticated products. In some areas their designs are similar, and in other areas the designs are very different. Planning a migration from CA-ACF2 to the RACF element of the OS/390 Security Server, without unduly disrupting an OS/390 production environment, requires considerable planning and understanding. With proper planning, and perhaps with specially skilled people to assist in certain areas, the migration can usually be accomplished in an orderly way. Understanding the higher-level issues and differences between the two products is an ... [more]


cover image

CA-TopSecret to OS/390 Security Server Migration Guide
z Systems Software

Redbooks, published 10 Oct 2000

CA-Top Secret and the OS/390 Security Server are both sophisticated products. In some areas their designs are similar, and in other areas the designs are very different. Planning a migration from CA-Top Secret to the RACF element of the OS/390 Security Server, without unduly disrupting an OS/390 production environment, requires considerable planning and understanding. With proper planning, and perhaps with specially skilled people to assist in certain areas, the migration can usually be accomplished in an orderly way. Understanding the higher-level issues and differences between the two ... [more]


cover image

S/390 Crypto PCI Implementation Guide
IBM Z

Redbooks, published 27 Jun 2000, last updated 14 Jul 2000

This IBM Redbooks publication is designed to help you understand and implement the S/390 Cryptographic PCICC card. Although this book is focused on the enablement of the S/390 PCICC product, cryptography and the available services on S/390 are also discussed and explained, with special attention given to the new Trusted Key Entry (TKE) workstation. Reader familiarity with the previous S/390 cryptography-related book: Exploiting S/390 Hardware Cryptography with TKE, SG24-5455, is ... [more]


 Previous

The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. Most of these publications are available in Adobe PDF format and may be viewed online or downloaded for offline viewing and printing. Read our How to buy page for details on how to order a bound hardcopy.



Follow IBM Redbooks

Follow IBM Redbooks