Develop and deploy a secure portal solution using WebSphere Portal V5 and Tivoli Access Manager V5.1 [[electronic resource] /] / [John Ganci ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Research Triangle Park, NC, : IBM, International Technical Support Organization, 2004 |
Descrizione fisica | xx, 702 p. : ill |
Disciplina | 005.8 |
Altri autori (Persone) | GanciJohn |
Collana | IBM redbooks |
Soggetto topico | Web portals - Security measures |
Soggetto genere / forma | Electronic books. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910449867103321 |
Research Triangle Park, NC, : IBM, International Technical Support Organization, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Develop and deploy a secure portal solution using WebSphere Portal V5 and Tivoli Access Manager V5.1 [[electronic resource] /] / [John Ganci ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Research Triangle Park, NC, : IBM, International Technical Support Organization, 2004 |
Descrizione fisica | xx, 702 p. : ill |
Disciplina | 005.8 |
Altri autori (Persone) | GanciJohn |
Collana | IBM redbooks |
Soggetto topico | Web portals - Security measures |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910783526303321 |
Research Triangle Park, NC, : IBM, International Technical Support Organization, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Develop and deploy a secure portal solution using WebSphere Portal V5 and Tivoli Access Manager V5.1 / / [John Ganci ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Research Triangle Park, NC, : IBM, International Technical Support Organization, 2004 |
Descrizione fisica | xx, 702 p. : ill |
Disciplina | 005.8 |
Altri autori (Persone) | GanciJohn |
Collana | IBM redbooks |
Soggetto topico | Web portals - Security measures |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Introduction to secure portal solutions -- Chapter 1. Introduction -- 1.1 Secure portal solution overview -- 1.1.1 Key concepts of a secure portal solution -- 1.1.2 Secure portal solution high level architecture -- 1.2 Solution software -- 1.2.1 Runtime environment solution software -- 1.2.2 Development environment solution software -- 1.3 Target audience of redbook -- 1.3.1 Roles and skills -- 1.3.2 Matching redbook topics to roles and skills -- Chapter 2. Security fundamentals -- 2.1 Security domain and risk management -- 2.1.1 Source of vulnerability and intruder reconnaissance -- 2.1.2 Physical security -- 2.1.3 Logical security -- 2.1.4 Security policy -- 2.1.5 Security risk management -- 2.2 Method for Architecting Secure Solutions (MASS) -- 2.3 Security fundamentals -- 2.3.1 Public Key Infrastructure (PKI) -- 2.3.2 WebSphere Portal security model -- 2.3.3 Tivoli Access Manager security model -- 2.3.4 Authentication -- 2.3.5 Authorization -- 2.3.6 WebSphere Portal Credential Vault -- 2.3.7 Tivoli Access Manager Global Sign-on (GSO) -- Chapter 3. Architecture and topology selection -- 3.1 Topology definition and operational model -- 3.1.1 Operational model overview -- 3.1.2 Topology zones -- 3.1.3 Conceptual model -- 3.1.4 Specified model -- 3.1.5 Security interaction patterns -- 3.2 Runtime environment topology selection -- 3.2.1 Entry runtime topology -- 3.2.2 Enterprise runtime topology -- 3.2.3 Extended enterprise runtime topology -- 3.3 Development environment topology selection -- 3.3.1 Conceptual model -- 3.3.2 Specified model -- 3.3.3 All-in-one approach -- 3.3.4 Develop and deploy without debug -- 3.3.5 Develop, deploy, and remote debugging.
3.3.6 Develop using a shared security infrastructure -- Chapter 4. Design and integration guidelines -- 4.1 Security and design guidelines -- 4.1.1 Design principles -- 4.1.2 WebSphere Portal vs Tivoli Access Manager authorization -- 4.1.3 Single sign-on guidelines -- 4.1.4 Identity management -- 4.1.5 Adding an external Web server for WebSphere Portal -- 4.2 Product-specific integration guidelines -- 4.2.1 WebSEAL junctions -- 4.2.2 Junction considerations for use with TAI -- 4.2.3 Handling of back-end application cookies -- 4.2.4 Junction Mapping Table (JMT) -- 4.2.5 WebSEAL URL-based access control -- 4.2.6 Access control of WebSphere Portal resources -- 4.2.7 Access control of resources within portlet applications -- 4.2.8 WebSEAL and WebSphere Portal session considerations -- 4.3 Sequence diagrams for common access patterns -- 4.3.1 UCT1: Access unprotected portal page -- 4.3.2 UCT2: Access protected portal page, provide valid credentials -- 4.3.3 UCT3: Access protected portal page with existing valid session -- 4.3.4 UCT4: Access protected portal page with invalid credentials -- 4.3.5 UCT5: WebSEAL session times out before portal session -- 4.3.6 UCT6: Portal session times out before WebSEAL session -- 4.3.7 UCT7: Both WebSEAL and WebSphere Portal sessions time out -- 4.3.8 UCT8: WebSphere Portal logout after WebSEAL session timeout -- 4.4 Component connections -- Part 2 ITSO working example secure portal solution -- Chapter 5. Requirements and solution design -- 5.1 Business scenario -- 5.1.1 Initial context -- 5.1.2 Business challenges -- 5.2 Business requirements -- 5.2.1 Functional requirements -- 5.2.2 Non-functional requirements -- 5.3 Use case model -- 5.3.1 Use case overview -- 5.3.2 Front-end use cases -- 5.3.3 Administrative use cases -- 5.4 Architecture -- 5.4.1 Architecture overview -- 5.4.2 Architecture decisions. 5.4.3 Selected runtime environment -- 5.4.4 Selected development environment -- Chapter 6. Install the runtime environment -- 6.1 Planning -- 6.1.1 Hardware and software prerequisites -- 6.1.2 Hardware used within the ITSO runtime environment -- 6.1.3 Software used within the ITSO runtime environment -- 6.1.4 Software installation paths and variables -- 6.1.5 Using VMWare and Ghost -- 6.2 Implement the Policy Server node -- 6.2.1 Windows 2000 Server installation -- 6.2.2 DB2 Universal Database installation -- 6.2.3 IBM GSKit upgrade installation -- 6.2.4 Java Runtime Environment (JRE) V1.3.1 installation -- 6.2.5 Tivoli Directory Server installation -- 6.2.6 Tivoli Directory Server configuration -- 6.2.7 Tivoli Web Administration Tool installation -- 6.2.8 Configure Directory Server for Tivoli Access Manager -- 6.2.9 Tivoli Access Manager installation -- 6.2.10 Tivoli Access Manager configuration -- 6.2.11 Tivoli Access Manager Web Portal Manager installation -- 6.2.12 Tivoli Access Manager V5.1 Base Fixpack 2 installation -- 6.3 Implement the Reverse Proxy node -- 6.3.1 Windows 2000 Server installation -- 6.3.2 Install GSKit -- 6.3.3 Install Java Runtime Environment (JRE) -- 6.3.4 Install Tivoli Directory Client -- 6.3.5 Tivoli Access Manager - WebSEAL installation -- 6.3.6 Tivoli Access Manager - WebSEAL configuration -- 6.3.7 Tivoli Access Manager V5.1 Base Fixpack 2 installation -- 6.3.8 Tivoli Access Manager V5.1 WebSEAL Fixpack 2 installation -- 6.4 Implement the Portal Server node -- 6.4.1 Windows 2000 Server installation -- 6.4.2 WebSphere Portal Server V5.0 installation -- 6.4.3 WebSphere Application Server Enterprise V5 Fixpack 2 (V5.0.2) installation -- 6.4.4 WebSphere Application Server V5.0.2 Fixes installation -- 6.4.5 WebSphere Portal V5 Fixpack 2 (V5.0.2) installation. 6.4.6 WebSphere Application Server Enterprise V5.0.2 Cumulative Fix (V5.0.2.3) installation -- 6.4.7 WebSphere Portal V5.0.2 Cumulative Fix 1 (V5.0.2.1) installation -- 6.4.8 Java Runtime Environment (JRE) V1.3.1 installation -- 6.4.9 Tivoli Access Manager Java Runtime Environment installation -- 6.4.10 DB2 Universal Database installation -- Chapter 7. Configure the runtime environment -- 7.1 Configure WebSphere Portal for DB2 -- 7.2 Configure WebSphere Portal for IBM HTTP Server -- 7.3 Configure WebSphere Portal for LDAP -- 7.3.1 Create a suffix -- 7.3.2 Create LDIF file containing users and groups -- 7.3.3 Import the LDIF file (wp-itso.ldif) to create users and groups -- 7.3.4 Enable LDAP security for WebSphere Portal -- 7.3.5 Verify the LDAP configuration -- 7.4 Enable mutual SSL between WebSEAL and WebSphere Portal -- 7.4.1 IBM HTTP Server SSL configuration -- 7.4.2 Configure WebSphere Portal for SSL -- 7.4.3 Export IBM HTTP Server CA certificate -- 7.4.4 Import IBM HTTP Server certificate into WebSEAL keystore -- 7.4.5 Export WebSEAL certificate -- 7.4.6 Import WebSEAL certificate into IBM HTTP Server keystore -- 7.4.7 Enable mutual SSL for IBM HTTP Server -- 7.5 Configure portal authentication with TAM using TAI -- 7.5.1 Apply Tivoli Access Manager ACLs to new LDAP suffixes -- 7.5.2 Define additional MIME types for WebSphere Application Server -- 7.5.3 Create a WebSEAL junction -- 7.5.4 Enable forms authentication on WebSEAL -- 7.5.5 Configure WebSEAL to modify URLs to back-end systems -- 7.5.6 Configure additional WebSEAL parameters -- 7.5.7 Import WebSphere Portal users and groups into TAM -- 7.5.8 Define access controls for WebSphere Portal URIs -- 7.5.9 Configure the junction mapping table -- 7.5.10 Configure SSO for WebSEAL and WebSphere via TAI -- 7.5.11 Configure Portal login/logout for use with WebSEAL. 7.6 Configure Portal for authorization with TAM -- 7.6.1 Configure the SSL between WebSphere and TAM -- 7.6.2 Implement JAAS authentication -- 7.6.3 Modify WebSphere Portal configuration files -- 7.6.4 Verify entries in TAM for Portal external authorization -- 7.6.5 Example for externalizing a resource -- 7.7 Integrate the Credential Vault -- 7.7.1 Credential Vault overview -- 7.7.2 Configure the Credential Vault for Tivoli Access Manager -- 7.7.3 Verify the Credential Vault -- 7.8 Additional configuration -- 7.8.1 Configure WebSEAL and WebSphere Portal sesssion timeouts -- 7.8.2 Configure WebSEAL to handle favicon.ico -- Chapter 8. Implement the development environment -- 8.1 Planning -- 8.1.1 Architecture overview -- 8.1.2 Hardware used within the ITSO development environment -- 8.1.3 Software used within the ITSO development environment -- 8.1.4 VMWare -- 8.2 Implement the Repository node (optional) -- 8.3 Implement the Policy Server node -- 8.4 Implement the Reverse Proxy node (optional) -- 8.5 Implement the Development node -- 8.5.1 Windows 2000 installation -- 8.5.2 WebSphere Studio Application Developer V5.1.1 installation -- 8.5.3 WebSphere Studio Application Developer V5.1.1 Interim Fix 002 installation -- 8.5.4 WebSphere Studio Application Developer - WebSphere Test Environment fixpack installation -- 8.5.5 WebSphere Portal Toolkit and test environment installation -- 8.5.6 Verify the Portal Toolkit and Test Environment installation -- 8.5.7 Java Runtime Environment (JRE) V1.3.1 installation -- 8.5.8 Tivoli Access Manager Java Runtime Environment installation -- 8.5.9 Configure the SSL between the WTE and TAM -- 8.5.10 Verify the TAM configuration within WebSphere Studio -- 8.5.11 CVS client configuration for WebSphere Studio -- 8.6 Configure WebSphere Portal for LDAP -- 8.6.1 Create a suffix. 8.6.2 Import the LDIF file (wp-itso.ldif) to create users and groups. |
Record Nr. | UNINA-9910815713803321 |
Research Triangle Park, NC, : IBM, International Technical Support Organization, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Document management using WebSphere Portal V5.0.2 and DB2 Content Manager V8.2 [[electronic resource] /] / [John Ganci ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | [S.l.], : IBM, International Technical Support Organization, 2004 |
Descrizione fisica | xviii, 502 p. : ill |
Disciplina | 025.04 |
Altri autori (Persone) | GanciJohn |
Collana | IBM redbooks |
Soggetto topico |
Web portals
Records - Management - Data processing |
Soggetto genere / forma | Electronic books. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910450489803321 |
[S.l.], : IBM, International Technical Support Organization, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Document management using WebSphere Portal V5.0.2 and DB2 Content Manager V8.2 [[electronic resource] /] / [John Ganci ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | [S.l.], : IBM, International Technical Support Organization, 2004 |
Descrizione fisica | xviii, 502 p. : ill |
Disciplina | 025.04 |
Altri autori (Persone) | GanciJohn |
Collana | IBM redbooks |
Soggetto topico |
Web portals
Records - Management - Data processing |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910783523203321 |
[S.l.], : IBM, International Technical Support Organization, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Document management using WebSphere Portal V5.0.2 and DB2 Content Manager V8.2 / / [John Ganci ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | [S.l.], : IBM, International Technical Support Organization, 2004 |
Descrizione fisica | xviii, 502 p. : ill |
Disciplina | 025.04 |
Altri autori (Persone) | GanciJohn |
Collana | IBM redbooks |
Soggetto topico |
Web portals
Records - Management - Data processing |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Introduction to document management -- Chapter 1. Introduction -- 1.1 Document management overview and concepts -- 1.1.1 Digital asset types -- 1.1.2 Digital media lifecycle -- 1.1.3 Key features of a document management system -- 1.1.4 IBM WebSphere Portal overview -- 1.1.5 IBM DB2 Content Manager overview -- 1.1.6 Technology options for document management -- 1.2 Managing content in the employee workplace -- 1.2.1 Employee workplace scenario -- 1.2.2 Employee workplace business problems and objective -- 1.2.3 Employee workplace solution benefits -- 1.2.4 Where to find more information -- 1.3 Solution software products and levels -- 1.3.1 Runtime environment solution software -- 1.3.2 Development environment solution software -- 1.4 Target audience -- 1.4.1 Roles and skills -- 1.4.2 Matching redbook topics to roles and skills -- Chapter 2. Architecture guidelines and technology options -- 2.1 Operational modeling guidelines -- 2.1.1 Application architecture components -- 2.1.2 Product mapping -- 2.1.3 Runtime environment topologies -- 2.1.4 Development environment topologies -- 2.2 Application architecture guidelines -- 2.2.1 Guidelines for non-functional requirements -- 2.2.2 Object retrieval from DB2 Content Manager -- 2.2.3 Capture -- 2.2.4 Retrieval -- 2.2.5 Search -- 2.2.6 Portlet application structure -- 2.3 Data model -- 2.3.1 Attribute -- 2.3.2 Attribute group -- 2.3.3 Components -- 2.3.4 Item type -- 2.3.5 Item type subset -- 2.3.6 Semantic type -- 2.3.7 References -- 2.3.8 Links -- 2.3.9 Foreign key -- 2.3.10 Objects -- 2.3.11 Text search -- 2.3.12 Design your data model using the building blocks -- 2.3.13 Integrate a Content Manager data model with a Portal -- 2.4 Workflow.
2.4.1 DB2 Content Manager Workflow -- 2.4.2 DB2 Content Manager Advanced Workflow -- 2.4.3 WebSphere MQ Workflow -- 2.4.4 WebSphere Portal Document Manager workflow -- 2.4.5 Business Process Choreographer -- 2.4.6 Lotus Workflow -- 2.5 Authentication -- 2.5.1 WebSphere Portal authentication -- 2.5.2 DB2 Content Manager authentication -- 2.5.3 Integration and single sign-on (SSO) guidelines -- 2.6 Authorization -- 2.6.1 WebSphere Portal authorization -- 2.6.2 DB2 Content Manager authorization -- 2.6.3 Tivoli Access Manager authorization -- Part 2 Portal document management solution -- Chapter 3. Requirements analysis and solution design -- 3.1 Business scenario -- 3.1.1 Initial context -- 3.1.2 Business challenges -- 3.2 Business requirements -- 3.2.1 Functional requirements -- 3.2.2 Non-functional requirements -- 3.3 Use case model -- 3.3.1 Use case overview -- 3.3.2 Front-end use cases -- 3.3.3 Administrative use cases -- 3.4 Solution design -- 3.4.1 Component architecture -- 3.4.2 Architectural decisions -- 3.4.3 Selected runtime topology -- 3.4.4 Selected development topology -- Chapter 4. Runtime environment installation -- 4.1 Planning and scenario overview -- 4.1.1 Scenario overview -- 4.1.2 Hardware and software prerequisites -- 4.1.3 Hardware used within the ITSO runtime environment -- 4.1.4 Software used within the ITSO runtime environment -- 4.1.5 Software installation paths and variables -- 4.2 Implement the Directory Server node -- 4.2.1 Windows 2000 Server installation -- 4.2.2 DB2 Universal Database installation -- 4.2.3 WebSphere Application Server installation -- 4.2.4 IBM GSKit installation -- 4.2.5 Tivoli Directory Server installation -- 4.2.6 Tivoli Directory Server configuration -- 4.2.7 Tivoli Web Administration Tool configuration -- 4.3 Implement the Library Server node -- 4.3.1 Windows 2000 Server installation. 4.3.2 DB2 Universal Database installation -- 4.3.3 DB2 Net Search Extender installation (optional) -- 4.3.4 Microsoft Visual C++ installation -- 4.3.5 Create user IDs with privileges for DB2 Content Manager -- 4.3.6 Remove environment variable -- 4.3.7 DB2 Content Manager Library Server installation -- 4.3.8 DB2 Content Manager Library Manager verification -- 4.3.9 DB2 Content Manager V8.2 Fixpack 6 installation -- 4.4 Implement the Resource Manager node -- 4.4.1 Windows 2000 Server installation -- 4.4.2 DB2 Universal Database installation -- 4.4.3 WebSphere Application Server installation -- 4.4.4 IBM HTTP Server SSL configuration -- 4.4.5 WebSphere Application Server configuration -- 4.4.6 Create user IDs with rights and privileges for Content Manager -- 4.4.7 DB2 Content Manager Resource Manager installation -- 4.4.8 DB2 Content Manager verification -- 4.4.9 DB2 Content Manager V8.2 Fixpack 6 installation -- 4.5 Implement the Portal Server node -- 4.5.1 Windows 2000 Server installation -- 4.5.2 WebSphere Portal Server V5.0 installation -- 4.5.3 WebSphere Application Server Enterprise V5 Fixpack 2 install -- 4.5.4 WebSphere Application Server V5.0.2 Fixes installation -- 4.5.5 WebSphere Portal V5 Fixpack 2 (V5.0.2) installation -- 4.5.6 WebSphere Application Server Enterprise V5.0.2 Cumulative Fix (V5.0.2.3) installation -- 4.5.7 WebSphere Portal V5.0.2 Cumulative Fix 1 (V5.0.2.1) installation -- 4.5.8 DB2 UDB installation -- 4.5.9 DB2 UDB Client configuration to DB2 Content Manager node -- 4.5.10 DB2 Information Integrator for Content installation -- 4.6 Install DB2 Content Manager Client -- Chapter 5. Runtime environment configuration -- 5.1 Configure WebSphere Portal for DB2 -- 5.2 Configure WebSphere Portal for IBM HTTP Server -- 5.3 Configure WebSphere Portal for LDAP -- 5.3.1 Create a suffix. 5.3.2 Create LDIF file containing users and groups -- 5.3.3 Import the LDIF file (wp-itso.ldif) to create users and groups -- 5.3.4 Enable LDAP security for WebSphere Portal -- 5.3.5 Verify the LDAP configuration -- 5.4 Configure DB2 Content Manager for LDAP -- 5.4.1 Prerequisite software for LDAP user authentication -- 5.4.2 Backup the DB2 Content Manager databases -- 5.4.3 Generate the cmbcmenv.properties file -- 5.4.4 Copy the cmbcmenv.properties file -- 5.4.5 Copy the icmxlslg.dll (user exit) -- 5.4.6 Enable trusted logons for Library Server -- 5.4.7 Create the ClientUserEditSSO privilege set -- 5.4.8 Set UserDB2TrustedConnect privilege set for ICMCONCT user -- 5.4.9 Configure LDAP User Import Scheduler -- 5.4.10 Verify the DB2 Content Manager LDAP configuration -- 5.5 SSL for LDAP server communication -- Chapter 6. Application deployment to the runtime environment -- 6.1 Application deployment overview -- 6.2 Prerequisites -- 6.2.1 Runtime environment installed and configured -- 6.2.2 Start the servers on runtime nodes -- 6.2.3 ITSO sample code download and unpack -- 6.3 Application configuration -- 6.3.1 Add EIP library to Web archive -- 6.3.2 Modify the ICMInfo.properties -- 6.4 User and group creation -- 6.4.1 Import users and groups into LDAP directory via ldif file -- 6.4.2 Import users and groups into DB2 Content Manager -- 6.5 DB2 Content Manager application deployment -- 6.5.1 Define the access control permissions -- 6.5.2 Define the data model -- 6.5.3 Define the workflow -- 6.6 WebSphere Portal application deployment -- 6.6.1 Add Content Manager common directory to Portal classpath -- 6.6.2 Install the ITSO document management portlets -- 6.6.3 Create portal pages -- 6.6.4 Add portlets to pages -- 6.6.5 Assign portal resource permissions -- 6.7 Verify the ITSO working example application. Chapter 7. Development environment installation -- 7.1 Planning -- 7.1.1 Architecture overview -- 7.1.2 Hardware used within the ITSO development environment -- 7.1.3 Software used within the ITSO development environment -- 7.2 Implement the Code Repository node (optional) -- 7.3 Implement the Document Management node -- 7.3.1 Windows 2000 Server installation -- 7.3.2 DB2 Universal Database installation -- 7.3.3 WebSphere Application Server installation -- 7.3.4 IBM HTTP Server SSL configuration -- 7.3.5 DB2 Net Search Extender installation (optional) -- 7.3.6 Microsoft Visual C++ installation -- 7.3.7 Create user IDs with privileges for DB2 Content Manager -- 7.3.8 Remove environment variable -- 7.3.9 DB2 Content Manager installation -- 7.3.10 DB2 Content Manager verification -- 7.3.11 DB2 Content Manager V8.2 Fixpack 6 installation -- 7.3.12 IBM GSKit installation -- 7.3.13 Tivoli Directory Server installation -- 7.3.14 Tivoli Directory Server configuration -- 7.3.15 Tivoli Web Administration Tool configuration -- 7.3.16 Backup DB2 Content Manager databases -- 7.4 Implement the Developer node -- 7.4.1 Windows installation -- 7.4.2 WebSphere Studio Application Developer V5.1.1 installation -- 7.4.3 WebSphere Studio V5.1.1 Interim Fix 002 installation -- 7.4.4 WebSphere Studio - Test Environment fixpack installation -- 7.4.5 WebSphere Portal Toolkit and Test Environment installation -- 7.4.6 Verify the Portal Toolkit and Test Environment installation -- 7.4.7 CVS client configuration for WebSphere Studio (optional) -- 7.4.8 DB2 Universal Database installation -- 7.4.9 DB2 UDB Client configuration to DB2 Content Manager -- 7.4.10 DB2 Information Integrator for Content installation -- 7.4.11 Install DB2 Content Manager Client -- 7.5 Configure the Developer node for LDAP -- 7.5.1 Create a suffix. 7.5.2 Import the LDIF file (wp-itso.ldif) to create users and groups. |
Record Nr. | UNINA-9910823610303321 |
[S.l.], : IBM, International Technical Support Organization, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Identity and access management solutions [[electronic resource] ] : using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1 / / John Ganci ... [et al.] |
Autore | Ganci John |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Research Triangle Park, N.C., : IBM, International Technical Support Organization, 2005 |
Descrizione fisica | xviii, 608 p. : ill |
Altri autori (Persone) | GanciJohn |
Collana | Redbooks |
Soggetto topico |
Web portals - Security measures
Computer networks - Security measures Computers - Access control |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910783544003321 |
Ganci John | ||
Research Triangle Park, N.C., : IBM, International Technical Support Organization, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Identity and access management solutions [[electronic resource] ] : using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1 / / John Ganci ... [et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Research Triangle Park, N.C., : IBM, International Technical Support Organization, 2005 |
Descrizione fisica | xviii, 608 p. : ill |
Altri autori (Persone) | GanciJohn |
Collana | Redbooks |
Soggetto topico |
Web portals - Security measures
Computer networks - Security measures Computers - Access control |
Soggetto genere / forma | Electronic books. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910450463403321 |
Research Triangle Park, N.C., : IBM, International Technical Support Organization, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Identity and access management solutions : using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1 / / John Ganci ... [et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Research Triangle Park, N.C., : IBM, International Technical Support Organization, 2005 |
Descrizione fisica | xviii, 608 p. : ill |
Altri autori (Persone) | GanciJohn |
Collana | Redbooks |
Soggetto topico |
Web portals - Security measures
Computer networks - Security measures Computers - Access control |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Introduction to identity and access management -- Chapter 1. Introduction -- 1.1 Introduction to identity and access management -- 1.1.1 Key concepts -- 1.1.2 High level solution architecture -- 1.2 Solution software -- 1.2.1 Runtime environment solution software -- 1.2.2 Development environment solution software -- 1.3 Target audience -- 1.3.1 Roles and skills -- 1.3.2 Matching redbook topics to roles and skills -- Chapter 2. Architecture and design guidelines -- 2.1 Operational modeling guidelines -- 2.1.1 Operational model overview -- 2.1.2 Topology zones -- 2.1.3 Application architecture components -- 2.1.4 Product mapping -- 2.1.5 Runtime environment topology selection -- 2.1.6 Development environment topology selection -- 2.2 Design principles -- 2.2.1 Centralized authority -- 2.2.2 Access decision evaluated on demand -- 2.2.3 Capture authentication events and logs -- 2.3 User provisioning guidelines -- 2.3.1 Identity management overview -- 2.3.2 Common LDAP directory -- 2.3.3 Tivoli Identity Manager services, workflows, and policies -- 2.3.4 Tivoli Directory Integrator assembly lines -- 2.3.5 Tivoli Directory Integrator connectors -- 2.4 Single sign-on authentication guidelines -- 2.4.1 WebSphere Portal authentication -- 2.4.2 DB2 Content Manager authentication -- 2.4.3 Single sign-on for WebSphere Portal and Content Manager -- 2.4.4 Single sign-on authentication using Tivoli Access Manager -- 2.5 Authorization guidelines -- 2.5.1 WebSphere Portal authorization -- 2.5.2 DB2 Content Manager authorization -- 2.5.3 Tivoli Access Manager authorization -- 2.5.4 WebSphere Portal vs. Tivoli Access Manager authorization -- 2.6 Product-specific integration guidelines -- 2.6.1 WebSEAL junctions.
2.6.2 Junction considerations for use with TAI -- 2.6.3 Handling of back-end application cookies -- 2.6.4 Junction Mapping Table (JMT) -- 2.6.5 WebSEAL URL-based access control -- 2.6.6 Access control of WebSphere Portal resources -- 2.6.7 Access control of resources within portlet applications -- 2.6.8 WebSEAL and WebSphere Portal session considerations -- 2.7 Sequence diagrams for common access patterns -- 2.7.1 UCT1: Access unprotected portal page -- 2.7.2 UCT2: Access protected portal page, provide valid credentials -- 2.7.3 UCT3: Access protected portal page with existing valid session -- 2.7.4 UCT4: Access protected portal page with invalid credentials -- 2.7.5 UCT5: WebSEAL session times out before portal session -- 2.7.6 UCT6: Portal session times out before WebSEAL session -- 2.7.7 UCT7: Both WebSEAL and WebSphere Portal sessions time out -- 2.7.8 UCT8: WebSphere Portal logout after WebSEAL session timeout -- Part 2 ITSO identity and access management working example -- Chapter 3. Requirements analysis and solution design -- 3.1 Business scenario -- 3.1.1 Initial context -- 3.1.2 Business challenges -- 3.2 Business requirements -- 3.2.1 Functional requirements -- 3.2.2 Non-functional requirements -- 3.3 Use case model -- 3.3.1 Use case overview -- 3.3.2 Use case details -- 3.4 Solution architecture -- 3.4.1 Architecture overview -- 3.4.2 Architectural decisions -- 3.4.3 Solution architecture details -- 3.4.4 Runtime topology and product mapping -- 3.4.5 Development environment topology and product mapping -- Chapter 4. Runtime environment installation -- 4.1 Planning -- 4.1.1 Hardware and software prerequisites -- 4.1.2 Hardware used within the ITSO runtime environment -- 4.1.3 Software used within the ITSO runtime environment -- 4.2 Directory node installation -- 4.2.1 Windows 2000 Server installation. 4.2.2 DB2 Universal Database V8.2 installation -- 4.2.3 IBM GSKit installation -- 4.2.4 WebSphere Application Server V5.0.2 installation -- 4.2.5 Tivoli Directory Server V5.2 installation -- 4.2.6 Tivoli Directory Server configuration -- 4.2.7 Tivoli Web Administration Tool configuration -- 4.2.8 Tivoli Directory Integrator installation -- 4.2.9 DB2 Information Integrator for Content installation -- 4.3 Access Manager node installation -- 4.3.1 Windows 2000 Server installation -- 4.3.2 IBM Java Runtime Environment (JRE) V1.3.1 installation -- 4.3.3 IBM GSKit installation -- 4.3.4 Tivoli Directory Client SDK 5.2 installation -- 4.3.5 WebSphere Application Server V5.0.2 installation -- 4.3.6 Configure Directory Server for Tivoli Access Manager -- 4.3.7 Tivoli Access Manager installation -- 4.3.8 Tivoli Access Manager configuration -- 4.3.9 Tivoli Access Manager Web Portal Manager installation -- 4.3.10 Tivoli Access Manager V5.1 Base Fixpack 9 installation -- 4.3.11 Configure Web Portal Manager -- 4.3.12 Verify the Web Portal Manager -- 4.3.13 Tivoli Identity Manager Agent for TAM installation -- 4.3.14 Tivoli Identity Manager Agent for TAM configuration -- 4.4 Reverse Proxy node installation -- 4.4.1 Windows 2000 Server installation -- 4.4.2 Java Runtime Environment (JRE) V1.3.1 installation -- 4.4.3 IBM GSKit installation -- 4.4.4 Tivoli Directory Client installation -- 4.4.5 Tivoli Access Manager: WebSEAL installation -- 4.4.6 Tivoli Access Manager: WebSEAL configuration -- 4.4.7 Tivoli Access Manager V5.1 Base Fixpack 9 installation -- 4.4.8 Tivoli Access Manager V5.1 WebSEAL Fixpack 9 installation -- 4.5 Identity Management node installation -- 4.5.1 Windows 2000 Server installation -- 4.5.2 DB2 Universal Database V8.2 installation -- 4.5.3 IBM GSKit V7.0.3.8 installation -- 4.5.4 Tivoli Directory Server V5.2 installation. 4.5.5 Tivoli Directory Server configuration -- 4.5.6 WebSphere Application Server V5.1 -- 4.5.7 Tivoli Identity Manager V4.5.1 Fixpack 16 (full install) -- 4.5.8 Install Tivoli Identity Manager V4.5.1 FP42 -- 4.5.9 Tivoli Identity Manager Agent for TAM profile configuration -- 4.6 Content Management node installation -- 4.6.1 Windows 2000 Server installation -- 4.6.2 Tivoli Directory Client SDK installation -- 4.6.3 WebSphere Application Server V5.1.1 installation -- 4.6.4 DB2 Universal Database V8.2 installation -- 4.6.5 Create user IDs with privileges for Content Manager -- 4.6.6 DB2 Content Manager V8.3 installation -- 4.6.7 DB2 Content Manager V8.3 Client for Windows installation -- 4.7 Portal Server node installation -- 4.7.1 Windows 2000 Server installation -- 4.7.2 WebSphere Portal V5.1 installation -- 4.7.3 IBM HTTP Server and WebSphere plug-in installation -- 4.7.4 Java Runtime Environment (JRE) V1.3.1 installation -- 4.7.5 Tivoli Access Manager Java Runtime Environment installation -- 4.7.6 DB2 UDB V8.2 ESE installation -- 4.7.7 DB2 UDB Client configuration to Content Manager -- 4.7.8 Information Integrator for Content V8.3 installation -- 4.7.9 Tivoli Identity Manager V4.5.1 API installation -- Chapter 5. Runtime environment configuration -- 5.1 Configure WebSphere Portal for DB2 UDB -- 5.1.1 Create a DB2 user for WebSphere Portal -- 5.1.2 Create DB2 UDB databases for WebSphere Portal -- 5.1.3 Migrate the data from Cloudscape to DB2 UDB -- 5.2 Configure WebSphere Portal with IBM HTTP Server -- 5.2.1 IBM HTTP Server configuration -- 5.2.2 Configure WebSphere Portal for the external IBM HTTP Server -- 5.3 Configure WebSphere Portal with LDAP -- 5.3.1 Create a suffix -- 5.3.2 Create LDIF file containing users and groups -- 5.3.3 Import the LDIF file (wp-itso.ldif) to create users and groups -- 5.3.4 Enable LDAP security for WebSphere Portal. 5.3.5 Verify the LDAP configuration -- 5.4 Configure DB2 Content Manager with LDAP -- 5.4.1 Back up the DB2 Content Manager databases -- 5.4.2 Generate the cmbcmenv.properties file -- 5.4.3 Copy the cmbcmenv.properties file -- 5.4.4 Copy the icmxlslg.dll (user exit) -- 5.4.5 Enable trusted logons for Library Server -- 5.4.6 Create the ClientUserEditSSO privilege sets -- 5.4.7 Test the configuration -- 5.4.8 Configure LTPA for WebSphere Application Server -- 5.4.9 Enable SSL for LDAP server communication -- 5.5 Enable mutual SSL between WebSEAL and Portal -- 5.5.1 IBM HTTP Server SSL configuration -- 5.5.2 Configure WebSphere Portal for SSL -- 5.5.3 Export IBM HTTP Server CA certificate -- 5.5.4 Import IBM HTTP Server certificate into WebSEAL keystore -- 5.5.5 Export WebSEAL certificate -- 5.5.6 Import WebSEAL certificate into IBM HTTP Server keystore -- 5.5.7 Enable mutual SSL for IBM HTTP Server -- 5.6 Configure Portal authentication with TAM using TAI -- 5.6.1 Apply Tivoli Access Manager ACLs to new LDAP suffixes -- 5.6.2 Define additional MIME types for WebSphere Application Server -- 5.6.3 Create a WebSEAL junction -- 5.6.4 Enable forms authentication on WebSEAL -- 5.6.5 Configure WebSEAL to modify URLs to back-end systems -- 5.6.6 Configure additional WebSEAL parameters -- 5.6.7 Import WebSphere Portal users and groups into TAM -- 5.6.8 Define access controls for WebSphere Portal URIs -- 5.6.9 Configure the junction mapping table (JMT) -- 5.6.10 Configure SSO for WebSEAL and WebSphere via TAI -- 5.6.11 Configure Portal login/logout for use with WebSEAL -- 5.7 Configure WebSphere Portal authorization with TAM -- 5.7.1 Configure SSL between WebSphere and TAM -- 5.7.2 Configure WebSphere Portal authorization for TAM -- 5.7.3 Verify entries in TAM for Portal external authorization -- 5.8 Configure reverse password synchronization. 5.8.1 Prerequisites. |
Record Nr. | UNINA-9910816209003321 |
Research Triangle Park, N.C., : IBM, International Technical Support Organization, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
WebSphere Commerce Portal V5.4 solutions [[electronic resource] ] : integrating WebSphere Commerce V5.4, business edition and WebSphere Portal V4.2 / / IBM, International Technical Support Organization, [John Ganci ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Research Triangle Park, NC, : IBM, International Technical Support Organization, c2003 |
Descrizione fisica | xvi, 386 p. : ill |
Altri autori (Persone) | GanciJohn |
Collana | IBM redbooks |
Soggetto topico | Electronic commerce - Computer programs |
Soggetto genere / forma | Electronic books. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910450157003321 |
Research Triangle Park, NC, : IBM, International Technical Support Organization, c2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|