Deployment Guide Series: IBM Tivoli Access Manager for e-business V6.0
An IBM Redbooks publication
Note: This is publication is now archived. For reference only.
Deploying an access control solution for a medium-size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, its deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an access control implementation.
This IBM Redbooks publication takes a step-by-step approach to implementing an access control solution based on IBM Tivoli Access Manager for e-business. Part 1 takes you through an example company profile with existing business policies and guidelines and builds an access control solution designed for this particular environment. In Part 2, we describe how the new access control components can be integrated into the existing environment. Then we explain how to execute the access control integration tasks that must be implemented in order to create a fully functional end-to-end solution.
This book does not introduce any general access control concepts, nor does it systematically explain all of Tivoli Access Manager's components and capabilities. Instead, those details are thoroughly discussed in the IBM Redbooks publication Enterprise Security Architecture Using IBM Tivoli Security Solutions, SG24-6014.
Part 1. Architecture and design
Chapter 1. Business context
Chapter 2. Planning for customer engagement
Part 2. Customer environment
Chapter 3. Company profile
Chapter 4. Solution design
Chapter 5. Installing the components
Chapter 6. Configuring IBM Tivoli Access Manager
Appendix A. Statement of work
Appendix B. Tips and tricks