Enterprise Security Architecture Using IBM Tivoli Security Solutions
An IBM Redbooks publication
Note: This is publication is now archived. For reference only.
Published on 07 August 2007
ISBN-10: 0738486418
ISBN-13: 9780738486413
IBM Form #: SG24-6014-04
Authors: Axel Buecker, Ana Veronica Carreno, Norman Field, Christopher Hockings, Daniel Kawer, Sujit Mohanty and Guilherme Monteiro
This IBM Redbooks publication reviews the overall Tivoli Enterprise Security Architecture. It focuses on the integration of audit and compliance, access control, identity management, and federation throughout extensive e-business enterprise implementations. The available security product diversity in the marketplace challenges everyone in charge of designing single secure solutions or an overall enterprise security architecture. With Access Manager, Identity Manager, Federated Identity Manager, Security Compliance Manager, Security Operations Manager, Directory Server, and Directory Integrator, Tivoli offers a complete set of products designed to address these challenges.
This book describes the major logical and physical components of each of the Tivoli products. It also depicts several e-business scenarios with different security challenges and requirements. By matching the desired Tivoli security product criteria, this publication describes the appropriate security implementations that meet the targeted requirements.
This book is a valuable resource for security officers, administrators, and architects who want to understand and implement enterprise security following architectural guidelines.
Part 1. Terminology and infrastructure
Chapter 1. Business context
Chapter 2. Common security architecture and network models
Chapter 3. Directory technologies
Chapter 4. Single sign-on technologies
Part 2. Managing access control
Chapter 5. Access Manager core components
Chapter 6. Access Manager for e-business
Chapter 7. A basic WebSEAL scenario
Chapter 8. Increasing availability and scalability
Chapter 9. Authentication and single sign-on with Access Manager for e-business
Chapter 10. Access Manager authorization
Chapter 11. Application integration
Chapter 12. Access Manager for Operating Systems
Chapter 13. Access Manager for Operating Systems business scenario
Chapter 14. Access Manager for Business Integration
Chapter 15. Access Manager for Enterprise Single Sign-On
Chapter 16. Tivoli Access Manager for Enterprise Single Sign-On scenario
Part 3. Managing identities and credentials
Chapter 17. Identity management
Chapter 18. Identity Manager structure and components
Chapter 19. Identity Manager scenarios
Chapter 20. Identity Manager Express structure and components
Chapter 21. Synchronizing the enterprise
Part 4. Managing federations
Chapter 22. Business context for identity federation
Chapter 23. Federation concepts
Chapter 24. Federated Identity Manager
Chapter 25. Cross enterprise federated single sign-on scenario
Chapter 26. Tivoli Federated Identity Manager patterns
Part 5. Managing security audit and compliance
Chapter 27. Introducing IBM Tivoli Common Auditing and Reporting Service
Chapter 28. Security Operations Manager topology and infrastructure
Chapter 29. Building a security information event management system
Chapter 30. Compliance management with Tivoli Security Compliance Manager
Chapter 31. Tivoli Security Compliance Manager scenarios
Appendix A. Method for Architecting Secure Solutions
Appendix B. Productivity and functional enhancements