Skip to main content

Enterprise Security Architecture Using IBM Tivoli Security Solutions

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 07 August 2007

  1. .EPUB (10.7 MB)
  2. .PDF (19.3 MB)

Google Play BooksRead in Google Books Order hardcopy
Share this page:   

ISBN-10: 0738486418
ISBN-13: 9780738486413
IBM Form #: SG24-6014-04


Authors: Axel Buecker, Ana Veronica Carreno, Norman Field, Christopher Hockings, Daniel Kawer, Sujit Mohanty and Guilherme Monteiro

    menu icon

    Abstract

    This IBM Redbooks publication reviews the overall Tivoli Enterprise Security Architecture. It focuses on the integration of audit and compliance, access control, identity management, and federation throughout extensive e-business enterprise implementations. The available security product diversity in the marketplace challenges everyone in charge of designing single secure solutions or an overall enterprise security architecture. With Access Manager, Identity Manager, Federated Identity Manager, Security Compliance Manager, Security Operations Manager, Directory Server, and Directory Integrator, Tivoli offers a complete set of products designed to address these challenges.

    This book describes the major logical and physical components of each of the Tivoli products. It also depicts several e-business scenarios with different security challenges and requirements. By matching the desired Tivoli security product criteria, this publication describes the appropriate security implementations that meet the targeted requirements.

    This book is a valuable resource for security officers, administrators, and architects who want to understand and implement enterprise security following architectural guidelines.

    Table of Contents

    Part 1. Terminology and infrastructure

    Chapter 1. Business context

    Chapter 2. Common security architecture and network models

    Chapter 3. Directory technologies

    Chapter 4. Single sign-on technologies

    Part 2. Managing access control

    Chapter 5. Access Manager core components

    Chapter 6. Access Manager for e-business

    Chapter 7. A basic WebSEAL scenario

    Chapter 8. Increasing availability and scalability

    Chapter 9. Authentication and single sign-on with Access Manager for e-business

    Chapter 10. Access Manager authorization

    Chapter 11. Application integration

    Chapter 12. Access Manager for Operating Systems

    Chapter 13. Access Manager for Operating Systems business scenario

    Chapter 14. Access Manager for Business Integration

    Chapter 15. Access Manager for Enterprise Single Sign-On

    Chapter 16. Tivoli Access Manager for Enterprise Single Sign-On scenario

    Part 3. Managing identities and credentials

    Chapter 17. Identity management

    Chapter 18. Identity Manager structure and components

    Chapter 19. Identity Manager scenarios

    Chapter 20. Identity Manager Express structure and components

    Chapter 21. Synchronizing the enterprise

    Part 4. Managing federations

    Chapter 22. Business context for identity federation

    Chapter 23. Federation concepts

    Chapter 24. Federated Identity Manager

    Chapter 25. Cross enterprise federated single sign-on scenario

    Chapter 26. Tivoli Federated Identity Manager patterns

    Part 5. Managing security audit and compliance

    Chapter 27. Introducing IBM Tivoli Common Auditing and Reporting Service

    Chapter 28. Security Operations Manager topology and infrastructure

    Chapter 29. Building a security information event management system

    Chapter 30. Compliance management with Tivoli Security Compliance Manager

    Chapter 31. Tivoli Security Compliance Manager scenarios

    Appendix A. Method for Architecting Secure Solutions

    Appendix B. Productivity and functional enhancements

     

    Others who read this also read