Vai al contenuto principale della pagina

Integrated identity management using IBM Tivoli security solutions / / [Axel Bucker ... et al.]



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Bucker Axel Visualizza persona
Titolo: Integrated identity management using IBM Tivoli security solutions / / [Axel Bucker ... et al.] Visualizza cluster
Pubblicazione: Austin, TX, : IBM, International Technical Support Organization, c2004
Edizione: 1st ed.
Descrizione fisica: 1 online resource (198 p.)
Soggetto topico: Electronic commerce - Security measures
Business enterprises - Computer networks - Security measures
Computer networks - Access control
Altri autori: BuckerAxel  
Note generali: "May 2004."
"SG24-6054-00."
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Why Integrated Identity Management -- Chapter 1. An introduction to a new reference architecture -- 1.1 Everything is on demand today -- 1.2 Security management methods and practices -- 1.2.1 Confidentiality -- 1.2.2 Integrity -- 1.2.3 Availability -- 1.2.4 Areas of security implied in the CIA Triad -- 1.3 Business drivers -- 1.4 Issues affecting identity integration solutions -- 1.5 Integrated identity in the enterprise -- 1.5.1 Access control management -- 1.5.2 Identity and credential management -- 1.5.3 Audit management -- 1.5.4 Directory management -- 1.5.5 Privacy management -- 1.6 Conclusion -- Chapter 2. What Bank International -- 2.1 Company profile -- 2.1.1 Geographic distribution of WBI -- 2.1.2 Organization of WBI -- 2.1.3 HR and personnel procedures -- 2.2 Current IT architecture -- 2.2.1 Overview of the WBI network -- 2.2.2 Recently implemented e-business initiative -- 2.2.3 Security infrastructure deployed for the e-business initiative -- 2.2.4 Secured e-business initiative architecture -- 2.2.5 Identity management and emerging problems -- 2.3 Corporate business vision and objectives -- 2.4 Business requirements -- 2.4.1 Business requirements for phase 1 -- 2.4.2 Business requirements for phase 2 -- 2.5 Functional requirements -- 2.5.1 Phase 1 -- 2.5.2 Phase 2 -- 2.6 Risk assessment -- 2.6.1 WBI risk assessment -- 2.7 Security design objectives -- 2.7.1 Functional design objectives -- 2.7.2 Non-functional design objectives -- 2.8 Architectural decisions -- Chapter 3. Applying the reference architecture -- 3.1 Solution design and delivery approach -- 3.1.1 Implementation life-cycle -- 3.1.2 Requirements analysis -- 3.1.3 Incremental delivery strategy -- 3.2 WBI solution design.
3.2.1 Solution overview -- 3.2.2 Component model -- 3.2.3 The operational architecture -- 3.2.4 The security architecture -- 3.2.5 Implementation phases -- Chapter 4. Implementing the solution -- 4.1 Development environment overview -- 4.1.1 Component model -- 4.1.2 Operational model -- 4.1.3 Security architecture -- 4.2 Technical implementation -- 4.2.1 Automatic provisioning -- 4.2.2 Application subscription -- 4.2.3 Self care -- 4.2.4 Self registration -- 4.3 Conclusion -- Part 2 Appendixes -- Appendix A. ISO 17799 compliance mapping -- Corporate policy and standards -- Standards, practices, and procedures -- Practical example -- External standards and certifications -- Industry specific requirements -- Product or solution certifications -- Nationally and internationally recognized standards -- Legal requirements -- ISO 17799 and integrated identity management -- Summary -- Glossary -- Related publications -- IBM Redbooks -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover.
Titolo autorizzato: Integrated identity management using IBM Tivoli security solutions  Visualizza cluster
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910811279703321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: IBM redbooks.