Deployment guide series. IBM Tivoli Identity Manager 5.0 / Axel Buecker, Walter Karl, Jani Perttila.
Deploying an identity management solution for a medium size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, their deployed infrastructure, and the application framework, we can define an applicable representation of th...
Saved in:
Online Access: |
Full Text (via O'Reilly/Safari) |
---|---|
Main Author: | |
Corporate Author: | |
Other Authors: | , |
Other title: | IBM Tivoli identity manager 5.0 |
Format: | eBook |
Language: | English |
Published: |
[United States] :
IBM,
2008.
|
Series: | IBM redbooks.
|
Subjects: |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | b11023480 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 090310s2008 xxua ob 001 0 eng d | ||
005 | 20240829143958.4 | ||
019 | |a 1044202951 |a 1056389923 |a 1074321763 |a 1100908685 |a 1103566454 | ||
020 | |a 0738432067 | ||
020 | |a 9780738432069 | ||
029 | 1 | |a AU@ |b 000057224793 | |
029 | 1 | |a AU@ |b 000067075449 | |
029 | 1 | |a CHBIS |b 006152158 | |
029 | 1 | |a CHVBK |b 171487737 | |
029 | 1 | |a DEBSZ |b 355376792 | |
035 | |a (OCoLC)safo313669099 | ||
035 | |a (OCoLC)313669099 |z (OCoLC)1044202951 |z (OCoLC)1056389923 |z (OCoLC)1074321763 |z (OCoLC)1100908685 |z (OCoLC)1103566454 | ||
037 | |a safo0738432067 | ||
040 | |a UMI |b eng |e pn |c UMI |d OCLCQ |d CEF |d OCLCQ |d DEBSZ |d OCLCQ |d OCLCO |d CNNAI |d OCLCF |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d REB |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCA |d OCLCQ |d TOH |d OCLCO |d OCLCQ |d OCLCO | ||
049 | |a GWRE | ||
050 | 4 | |a HF5548.32 |b .B813 2008 | |
100 | 1 | |a Bücker, Axel. | |
245 | 1 | 0 | |a Deployment guide series. |p IBM Tivoli Identity Manager 5.0 / |c Axel Buecker, Walter Karl, Jani Perttila. |
246 | 3 | 0 | |a IBM Tivoli identity manager 5.0 |
260 | |a [United States] : |b IBM, |c 2008. | ||
300 | |a 1 online resource (xvi, 284 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a volume |b nc |2 rdacarrier | ||
490 | 1 | |a IBM redbooks | |
500 | |a Title from resource description page. | ||
504 | |a Includes bibliographical references (pages 279-280) and index. | ||
588 | 0 | |a Print version record. | |
520 | |a Deploying an identity management solution for a medium size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, their deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an identity management implementation. This IBM® Redbooks® publication, intended for IBM Business Partners, takes a step-by-step approach to implementing an identity management solution based on IBM Tivoli® Identity Manager. Part 1 discusses the general business context and the planning approach for an identity management solution. Part 2 takes you through an example company profile with existing business policies and guidelines and builds an identity management solution design for this particular environment. We describe how the components can be integrated into the existing environment. Then, we focus on the detailed configuration of identity management integration tasks that must be implemented in order to create a fully functional end-to-end solution. This IBM Redbooks publication does not introduce any general identity management concepts, nor does it systematically explain all of Tivoli Identity Manager's components and capabilities; instead, those details are thoroughly discussed in the IBM Redbooks publications: Identity Management Design Guide with IBM Tivoli Identity Manager, SG24-6996, and Enterprise Security Architecture Using IBM Tivoli Security Solutions, SG24-6014. | ||
630 | 0 | 0 | |a IBM Tivoli identity manager. |
630 | 0 | 7 | |a IBM Tivoli identity manager |2 fast |
650 | 0 | |a Electronic commerce |x Security measures. | |
650 | 0 | |a Business |x Data processing |x Security measures. | |
650 | 0 | |a Computer networks |x Access control. | |
650 | 0 | |a Computer security. | |
650 | 7 | |a Business |x Data processing |x Security measures |2 fast | |
650 | 7 | |a Computer networks |x Access control |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Electronic commerce |x Security measures |2 fast | |
700 | 1 | |a Perttilä, Jani. | |
700 | 1 | |a Karl, Walter. | |
710 | 2 | |a International Business Machines Corporation. | |
830 | 0 | |a IBM redbooks. | |
856 | 4 | 0 | |u https://go.oreilly.com/UniOfColoradoBoulder/library/view/~/0738432067/?ar |z Full Text (via O'Reilly/Safari) |
915 | |a - | ||
956 | |a O'Reilly-Safari eBooks | ||
956 | |b O'Reilly Online Learning: Academic/Public Library Edition | ||
994 | |a 92 |b COD | ||
998 | |b Subsequent record output | ||
999 | f | f | |i 6e698737-37b6-55f6-9e2b-497b29ca2fe0 |s ad03d32b-3ef4-5243-8681-de191333b8b6 |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e HF5548.32 .B813 2008 |h Library of Congress classification |i web |n 1 |