04860nam 2200601Ia 450 991081127970332120200520144314.0(CKB)1000000000243535(OCoLC)61397302(CaPaEBR)ebrary10112089(SSID)ssj0000280824(PQKBManifestationID)11223706(PQKBTitleCode)TC0000280824(PQKBWorkID)10299961(PQKB)10529014(MiAaPQ)EBC3306357(Au-PeEL)EBL3306357(CaPaEBR)ebr10112089(EXLCZ)99100000000024353520050302d2004 uy 0engurcn|||||||||txtccrIntegrated identity management using IBM Tivoli security solutions /[Axel Bucker ... et al.]1st ed.Austin, TX IBM, International Technical Support Organizationc20041 online resource (198 p.) IBM redbooks"May 2004.""SG24-6054-00."0-7384-9784-3 Includes bibliographical references and index.Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Why Integrated Identity Management -- Chapter 1. An introduction to a new reference architecture -- 1.1 Everything is on demand today -- 1.2 Security management methods and practices -- 1.2.1 Confidentiality -- 1.2.2 Integrity -- 1.2.3 Availability -- 1.2.4 Areas of security implied in the CIA Triad -- 1.3 Business drivers -- 1.4 Issues affecting identity integration solutions -- 1.5 Integrated identity in the enterprise -- 1.5.1 Access control management -- 1.5.2 Identity and credential management -- 1.5.3 Audit management -- 1.5.4 Directory management -- 1.5.5 Privacy management -- 1.6 Conclusion -- Chapter 2. What Bank International -- 2.1 Company profile -- 2.1.1 Geographic distribution of WBI -- 2.1.2 Organization of WBI -- 2.1.3 HR and personnel procedures -- 2.2 Current IT architecture -- 2.2.1 Overview of the WBI network -- 2.2.2 Recently implemented e-business initiative -- 2.2.3 Security infrastructure deployed for the e-business initiative -- 2.2.4 Secured e-business initiative architecture -- 2.2.5 Identity management and emerging problems -- 2.3 Corporate business vision and objectives -- 2.4 Business requirements -- 2.4.1 Business requirements for phase 1 -- 2.4.2 Business requirements for phase 2 -- 2.5 Functional requirements -- 2.5.1 Phase 1 -- 2.5.2 Phase 2 -- 2.6 Risk assessment -- 2.6.1 WBI risk assessment -- 2.7 Security design objectives -- 2.7.1 Functional design objectives -- 2.7.2 Non-functional design objectives -- 2.8 Architectural decisions -- Chapter 3. Applying the reference architecture -- 3.1 Solution design and delivery approach -- 3.1.1 Implementation life-cycle -- 3.1.2 Requirements analysis -- 3.1.3 Incremental delivery strategy -- 3.2 WBI solution design.3.2.1 Solution overview -- 3.2.2 Component model -- 3.2.3 The operational architecture -- 3.2.4 The security architecture -- 3.2.5 Implementation phases -- Chapter 4. Implementing the solution -- 4.1 Development environment overview -- 4.1.1 Component model -- 4.1.2 Operational model -- 4.1.3 Security architecture -- 4.2 Technical implementation -- 4.2.1 Automatic provisioning -- 4.2.2 Application subscription -- 4.2.3 Self care -- 4.2.4 Self registration -- 4.3 Conclusion -- Part 2 Appendixes -- Appendix A. ISO 17799 compliance mapping -- Corporate policy and standards -- Standards, practices, and procedures -- Practical example -- External standards and certifications -- Industry specific requirements -- Product or solution certifications -- Nationally and internationally recognized standards -- Legal requirements -- ISO 17799 and integrated identity management -- Summary -- Glossary -- Related publications -- IBM Redbooks -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover.IBM redbooks.Electronic commerceSecurity measuresBusiness enterprisesComputer networksSecurity measuresComputer networksAccess controlElectronic commerceSecurity measures.Business enterprisesComputer networksSecurity measures.Computer networksAccess control.Bucker Axel0Bucker Axel0International Business Machines Corporation.International Technical Support Organization.MiAaPQMiAaPQMiAaPQBOOK9910811279703321Integrated identity management using IBM Tivoli security solutions4058807UNINA