Distributed Security and High Availability with Tivoli Access Manager and WebSphere Application Server for z/OS
An IBM Redbooks publication
Note: This is publication is now archived. For reference only.
Integrating an IBM WebSphere Application Server for z/OS cluster with IBM Tivoli Access Manager is challenging. Tailoring the business this way allows administrators to facilitate the best of both worlds, so they can focus WebSphere Application Server as a Java environment provider and Tivoli Access Manager as a security policy enforcer.
This IBM Redbooks publication gives you a broad understanding of how you can enforce security for IBM WebSphere Application Server on z/OS, by using IBM Tivoli Access Manager on a distributed platform. It explains how you can achieve security, scalability, and high availability by adding and further configuring resources to a computing environment.
This book also demonstrates how to configure a WebSphere Application Server for z/OS cluster functioning with Tivoli Access Manager. It exploits high availability scenarios that you can implement in your organization. This book uses the following components for high availability:
Specific products are employed for their functions and strengths. And, basic products are configured to demonstrate their high availability characteristics.
Chapter 1. Concepts and architecture
Chapter 2. Tivoli Access Manager and WebSphere Application Server for z/OS integration
Chapter 3. Designing the TAM, WAS for z/OS integration architecture
Chapter 4. Project test environment
Chapter 5. Implementing the user repository: LDAP on AIX and LDAP on z/OS
Chapter 6. Implementing the security manager: Tivoli Access Manager
Chapter 7. Implementing the security proxy: WebSEAL
Chapter 8. Implementing WebSphere Edge Components Load Balancer
Chapter 9. Implementing the application server: HTTP Server for z/OS and WAS for z/OS
Chapter 10. Implementing the TAM and WAS for z/OS integration
Chapter 11. Using and validating the TAM and WAS for z/OS integration solution
Appendix A. LDAP on z/OS native authentication
Appendix B. Additional material