LEADER 04860nam 2200601Ia 450 001 9910811279703321 005 20200520144314.0 035 $a(CKB)1000000000243535 035 $a(OCoLC)61397302 035 $a(CaPaEBR)ebrary10112089 035 $a(SSID)ssj0000280824 035 $a(PQKBManifestationID)11223706 035 $a(PQKBTitleCode)TC0000280824 035 $a(PQKBWorkID)10299961 035 $a(PQKB)10529014 035 $a(MiAaPQ)EBC3306357 035 $a(Au-PeEL)EBL3306357 035 $a(CaPaEBR)ebr10112089 035 $a(EXLCZ)991000000000243535 100 $a20050302d2004 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aIntegrated identity management using IBM Tivoli security solutions /$f[Axel Bucker ... et al.] 205 $a1st ed. 210 $aAustin, TX $cIBM, International Technical Support Organization$dc2004 215 $a1 online resource (198 p.) 225 1 $aIBM redbooks 300 $a"May 2004." 300 $a"SG24-6054-00." 311 $a0-7384-9784-3 320 $aIncludes bibliographical references and index. 327 $aFront cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Why Integrated Identity Management -- Chapter 1. An introduction to a new reference architecture -- 1.1 Everything is on demand today -- 1.2 Security management methods and practices -- 1.2.1 Confidentiality -- 1.2.2 Integrity -- 1.2.3 Availability -- 1.2.4 Areas of security implied in the CIA Triad -- 1.3 Business drivers -- 1.4 Issues affecting identity integration solutions -- 1.5 Integrated identity in the enterprise -- 1.5.1 Access control management -- 1.5.2 Identity and credential management -- 1.5.3 Audit management -- 1.5.4 Directory management -- 1.5.5 Privacy management -- 1.6 Conclusion -- Chapter 2. What Bank International -- 2.1 Company profile -- 2.1.1 Geographic distribution of WBI -- 2.1.2 Organization of WBI -- 2.1.3 HR and personnel procedures -- 2.2 Current IT architecture -- 2.2.1 Overview of the WBI network -- 2.2.2 Recently implemented e-business initiative -- 2.2.3 Security infrastructure deployed for the e-business initiative -- 2.2.4 Secured e-business initiative architecture -- 2.2.5 Identity management and emerging problems -- 2.3 Corporate business vision and objectives -- 2.4 Business requirements -- 2.4.1 Business requirements for phase 1 -- 2.4.2 Business requirements for phase 2 -- 2.5 Functional requirements -- 2.5.1 Phase 1 -- 2.5.2 Phase 2 -- 2.6 Risk assessment -- 2.6.1 WBI risk assessment -- 2.7 Security design objectives -- 2.7.1 Functional design objectives -- 2.7.2 Non-functional design objectives -- 2.8 Architectural decisions -- Chapter 3. Applying the reference architecture -- 3.1 Solution design and delivery approach -- 3.1.1 Implementation life-cycle -- 3.1.2 Requirements analysis -- 3.1.3 Incremental delivery strategy -- 3.2 WBI solution design. 327 $a3.2.1 Solution overview -- 3.2.2 Component model -- 3.2.3 The operational architecture -- 3.2.4 The security architecture -- 3.2.5 Implementation phases -- Chapter 4. Implementing the solution -- 4.1 Development environment overview -- 4.1.1 Component model -- 4.1.2 Operational model -- 4.1.3 Security architecture -- 4.2 Technical implementation -- 4.2.1 Automatic provisioning -- 4.2.2 Application subscription -- 4.2.3 Self care -- 4.2.4 Self registration -- 4.3 Conclusion -- Part 2 Appendixes -- Appendix A. ISO 17799 compliance mapping -- Corporate policy and standards -- Standards, practices, and procedures -- Practical example -- External standards and certifications -- Industry specific requirements -- Product or solution certifications -- Nationally and internationally recognized standards -- Legal requirements -- ISO 17799 and integrated identity management -- Summary -- Glossary -- Related publications -- IBM Redbooks -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover. 410 0$aIBM redbooks. 606 $aElectronic commerce$xSecurity measures 606 $aBusiness enterprises$xComputer networks$xSecurity measures 606 $aComputer networks$xAccess control 615 0$aElectronic commerce$xSecurity measures. 615 0$aBusiness enterprises$xComputer networks$xSecurity measures. 615 0$aComputer networks$xAccess control. 700 $aBucker$b Axel$00 701 $aBucker$b Axel$00 712 02$aInternational Business Machines Corporation.$bInternational Technical Support Organization. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910811279703321 996 $aIntegrated identity management using IBM Tivoli security solutions$94058807 997 $aUNINA