IBM Security Access Manager Appliance Deployment Patterns

An IBM Redpaper publication

thumbnail 

Published on 23 October 2015, updated 02 November 2015

  1. .EPUB (1.3 MB)
  2. .PDF (4.3 MB)

Apple BooksGoogle Play Books
Share this page:   

ISBN-10: 0738454559
ISBN-13: 9780738454559
IBM Form #: REDP-5256-00


Authors: Shahnawaz Backer, James Darwin, Vasfi Gucer, Chris Hockings, Trevor Norvill, Nilesh Patel, Martin Schmidt, Asha Shivalingaiah and Serge Vereecke

    menu icon

    Abstract

    IBM® Security Access Manager is a modular, integrated access management appliance that helps secure access to web, mobile, and cloud workloads. It is offered both as a physical appliance and as a virtual appliance image that runs on several popular hypervisors. The integrated appliance form factor enables easier and more flexible deployment and maintenance.

    This IBM Redpaper™ publication describes the different Security Access Manager Appliance V9.0 deployment patterns and uses hands-on examples to demonstrate how to initially configure systems in those deployments. It also describes various deployment considerations, such as networking, high-availability, performance, disaster recovery, and scalability. All of these deployment patterns are covered within the context of realistic business scenarios.

    This paper is especially helpful to Security Access Manager architects and deployment specialists.

    Table of Contents

    Chapter 1. IBM Security Access Manager design and architecture

    Chapter 2. IBM Security Access Manager clustering

    Chapter 3. Single appliance cluster pattern

    Chapter 4. Multiple appliances in a single location

    Chapter 5. Twin Data Center pattern

    Chapter 6. Security Access Manager and DataPower integration patterns

     

    Others who read this also read