IBM WebSphere DataPower SOA Appliances Part II: Authentication and Authorization

An IBM Redpaper publication



Abstract

IBM® WebSphere® DataPower® SOA Appliances represent an important element in the holistic approach of IBM to service-oriented architecture (SOA). IBM SOA appliances are purpose-built, easy-to-deploy network devices that simplify, secure, and accelerate your XML and Web services deployments while extending your SOA infrastructure. These appliances offer an innovative, pragmatic approach to harness the power of SOA. By using them, you can simultaneously use the value of your existing application, security, and networking infrastructure investments.

This series of IBM Redbooks publications is written for architects and administrators who need to understand the implemented architecture in WebSphere DataPower appliances to successfully deploy it as a secure and efficient enterprise service bus (ESB) product. These papers give a broad understanding of the new architecture and traditional deployment scenarios. They cover details about the implementation to help you identify the circumstances under which you should deploy DataPower appliances. They also provide a sample implementation and architectural best practices for an SOA message-oriented architecture in an existing production ESB environment.

Part 2 of the series, this part, provides information about ways to integrate the DataPower appliance with other products such as IBM Tivoli® Access Manager and Tivoli Directory Server. The entire IBM WebSphere DataPower SOA Appliances series includes the following papers:


  • "IBM WebSphere DataPower SOA Appliances Part I: Overview and Getting Started," REDP-4327
  • "IBM WebSphere DataPower SOA Appliances Part II: Authentication and Authorization," REDP-4364
  • "IBM WebSphere DataPower SOA Appliances Part III: XML Security Guide," REDP-4365
  • "IBM WebSphere DataPower SOA Appliances Part IV: Management and Governance," REDP-4366

Table of contents

Chapter 1. Authentication and authorization
Chapter 2. AAA concepts and policy creation
Chapter 3. AAA with Tivoli Access Manager
Chapter 4. AAA with the LDAP directory
Appendix A. External keys
Appendix B. Additional material



Profile

Publish Date
01 April 2008


Rating:
(based on 1 review)


Author(s)

IBM Form Number
REDP-4364-00

Number of pages
118