top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Deployment guide series : IBM Tivoli Security Compliance Manager / / Axel Buecker, Hendrik H. Fulda, Dieter Riexinger
Deployment guide series : IBM Tivoli Security Compliance Manager / / Axel Buecker, Hendrik H. Fulda, Dieter Riexinger
Autore Bucker Axel
Edizione [1st ed.]
Pubbl/distr/stampa Austin, TX, : IBM International Technical Support Organization, 2005
Descrizione fisica xii, 196 p
Disciplina 005.8
Altri autori (Persone) FuldaHendrik H
RiexingerDieter
Collana Redbooks
Soggetto topico Electronic commerce - Security measures
Business enterprises - Computer networks - Access control
Computer networks - Access control
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Architecture and design -- Chapter 1. Business context for security compliance management -- 1.1 Introduction to compliance management -- 1.2 Why compliance management? -- 1.3 Determining the how: influencing factors -- 1.4 General challenges -- 1.5 Conclusion -- Chapter 2. Tivoli Security Compliance Manager design and structure -- 2.1 Logical component architecture -- 2.1.1 Data collection components -- 2.1.2 Compliance evaluation components -- 2.1.3 Compliance report components -- 2.1.4 Security Compliance Manager server -- 2.1.5 Administration components -- 2.2 Physical component architecture -- 2.2.1 Communication port usage -- 2.2.2 Deployment on physical nodes -- 2.3 Security Compliance Manager walkthrough -- Chapter 3. Architecting a Security Compliance Management solution -- 3.1 Solution architectures, design, and methodologies -- 3.2 Design process -- 3.2.1 Typical context of Security Compliance Manager solutions -- 3.2.2 Phased project approach -- 3.2.3 Placing components in network zones -- 3.2.4 Deployment of Security Compliance Manager clients -- 3.2.5 Delegated administration -- 3.2.6 Implementation of Security Compliance Manager policies -- 3.2.7 Integration with access control management systems -- 3.2.8 Integration with Tivoli Risk Manager -- 3.3 Business processes and compliance management -- 3.3.1 A generic security compliance management business process -- 3.3.2 Security Compliance Manager business process support -- 3.3.3 Automated security compliance management -- Part 2 Customer environment -- Chapter 4. Armando Brothers Banking Corp. -- 4.1 Company profile -- 4.2 Current IT architecture -- 4.2.1 Existing security infrastructure -- 4.2.2 Existing middleware infrastructure.
4.3 Current security policies and standards -- 4.4 Emerging problems -- 4.5 Strategic objectives -- 4.6 Critical success factors for strategy implementation -- 4.7 Resulting business requirements -- 4.8 Requirements on project execution -- 4.9 ROI study and results -- Chapter 5. Security Compliance Manager design -- 5.1 Functional requirements -- 5.1.1 Phase I: Establishing a baseline -- 5.1.2 Phase II: Extend coverage -- 5.2 Design objectives -- 5.2.1 General and infrastructure objectives -- 5.2.2 Platform specific security concepts -- 5.3 Implementation architecture -- 5.3.1 Physical components -- 5.3.2 User roles and responsibilities -- 5.4 Project organization -- Chapter 6. Technical implementation -- 6.1 Deployment phase I -- 6.1.1 Planning and installing the server -- 6.1.2 DB2 maintenance tasks -- 6.1.3 Deploying clients -- 6.1.4 Installing the reporting server -- 6.1.5 Configuring operational reports -- 6.2 Deployment phase II -- 6.2.1 Tivoli Access Manager integration -- 6.2.2 Tivoli Risk Manager integration -- 6.2.3 Collector development -- 6.2.4 Report development -- 6.3 Conclusion -- Part 3 Appendixes -- Appendix A. Developing a custom collector -- Required method getReleaseNumber() -- Required method getCompatibleOS() -- Required method getDescription() -- Required method getParameters() -- Required method getTables() -- Required method executeV2() -- Appendix B. Introducing the Security Vulnerability Index -- So what is the IBM Global Services Vulnerability Index? -- How does it work? -- Appendix C. Additional material -- Locating the Web material -- Using the Web material -- How to use the Web material -- Glossary -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover.
Record Nr. UNINA-9910815714003321
Bucker Axel  
Austin, TX, : IBM International Technical Support Organization, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Deployment guide series [[electronic resource] ] : IBM Tivoli Security Compliance Manager / / Axel Buecker, Hendrik H. Fulda, Dieter Riexinger
Deployment guide series [[electronic resource] ] : IBM Tivoli Security Compliance Manager / / Axel Buecker, Hendrik H. Fulda, Dieter Riexinger
Autore Bücker Axel
Edizione [1st ed.]
Pubbl/distr/stampa Austin, TX, : IBM International Technical Support Organization, 2005
Descrizione fisica xii, 196 p
Disciplina 005.8
Altri autori (Persone) FuldaHendrik H
RiexingerDieter
Collana Redbooks
Soggetto topico Electronic commerce - Security measures
Business enterprises - Computer networks - Access control
Computer networks - Access control
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910449871103321
Bücker Axel  
Austin, TX, : IBM International Technical Support Organization, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Deployment guide series [[electronic resource] ] : IBM Tivoli Security Compliance Manager / / Axel Buecker, Hendrik H. Fulda, Dieter Riexinger
Deployment guide series [[electronic resource] ] : IBM Tivoli Security Compliance Manager / / Axel Buecker, Hendrik H. Fulda, Dieter Riexinger
Autore Bücker Axel
Edizione [1st ed.]
Pubbl/distr/stampa Austin, TX, : IBM International Technical Support Organization, 2005
Descrizione fisica xii, 196 p
Disciplina 005.8
Altri autori (Persone) FuldaHendrik H
RiexingerDieter
Collana Redbooks
Soggetto topico Electronic commerce - Security measures
Business enterprises - Computer networks - Access control
Computer networks - Access control
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910783526503321
Bücker Axel  
Austin, TX, : IBM International Technical Support Organization, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Enterprise business portals II with IBM tivoli access manager / / Axel Bucker et al
Enterprise business portals II with IBM tivoli access manager / / Axel Bucker et al
Autore Bucker Axel
Pubbl/distr/stampa San Jose, CA, : IBM, 2003
Descrizione fisica xxii, 468 p. : ill
Disciplina 658.4/72
Altri autori (Persone) AntoniusJesper
RiexingerDieter
SommerFrank
SumidaAtsushi
Collana IBM redbooks
Soggetto topico Computer networks - Security measures
Web portals - Security measures
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover -- Contents -- Figures -- Tables -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Integration design and architecture -- Chapter 1. IBM WebSphere Portal integration -- 1.1 WebSphere Portal offerings -- 1.1.1 WebSphere Portal Enable -- 1.1.2 WebSphere Portal Extend -- 1.1.3 WebSphere Portal Experience -- 1.2 WebSphere Portal architecture -- 1.2.1 Presentation services -- 1.2.2 WebSphere Portal infrastructure -- 1.2.3 Tivoli Access Manager integration architecture -- 1.3 WebSphere Portal security -- 1.3.1 Authentication -- 1.3.2 Authorization -- 1.3.3 Administration -- 1.4 WebSphere Portal and Tivoli Access Manager -- 1.4.1 Tivoli Access Manager added value -- 1.4.2 Tivoli Access Manager managing WebSphere Portal resources -- Chapter 2. SAP Workplace and SAP Enterprise Portal integration -- 2.1 mySAP.com portfolio -- 2.1.1 mySAP.com Workplace -- 2.1.2 SAP Enterprise Portal -- 2.2 mySAP.com Workplace -- 2.2.1 SAP Workplace architecture -- 2.2.2 SAP Workplace security -- 2.3 SAP Workplace using Tivoli Access Manager -- 2.3.1 Access Manager added value -- 2.3.2 Access Manager integration architecture -- 2.4 SAP Portal -- 2.4.1 Introduction -- 2.4.2 SAP Enterprise Information Portal architecture -- 2.4.3 SAP Enterprise Portal security -- 2.5 SAP Portal security using Tivoli Access Manager -- 2.5.1 Access Manager added value -- 2.5.2 Access Manager integration architecture -- Chapter 3. Web Services integration -- 3.1 General business environment -- 3.2 Web Services definition -- 3.2.1 Web Services model -- 3.3 Web Services for real business -- 3.3.1 Security overview -- 3.3.2 XKMS overview -- 3.3.3 SAML overview -- 3.3.4 Summary -- 3.4 Security integration with Tivoli Access Manager -- 3.4.1 Introduction -- 3.4.2 Security models.
3.4.3 Administration of Web Services with aznAPI -- 3.4.4 Configuration of Web Services with Tivoli Access Manager -- Part 2 Automobile industry solution -- Chapter 4. Automobile industry solution -- 4.1 Group structure and company profile -- 4.2 Current architecture -- 4.3 Corporate business vision and objectives -- 4.4 Project layout and implementation phases -- 4.5 Business requirements -- 4.6 Functional requirements -- 4.6.1 Risk assessment -- 4.7 Security design objectives -- 4.8 Design approach -- 4.9 Implementation architecture -- 4.9.1 Single sign-on architecture -- 4.9.2 Infrastructure -- 4.9.3 Authorization architecture -- 4.10 Technical implementation -- 4.10.1 Implementing the portal platform -- 4.10.2 SAP ITS integration -- 4.10.3 Exchange 2000 integration -- 4.10.4 Lotus QuickPlace integration -- 4.10.5 Integrating Business Intelligence -- 4.10.6 Performing risk assessment -- 4.11 Conclusion -- Part 3 Retail industry solution -- Chapter 5. Retailer industry solution -- 5.1 Company structure and profile -- 5.2 Current architecture -- 5.3 Corporate business vision and objectives -- 5.4 Project layout and implementation -- 5.5 Business requirements -- 5.6 Functional requirements -- 5.6.1 Risk assessment -- 5.7 Security design objectives -- 5.8 Implementation architecture -- 5.8.1 Integration of Tivoli Access Manager into the architecture -- 5.8.2 Integration of WebSphere Portal into the architecture -- 5.9 Technical implementation -- 5.9.1 System setup -- 5.9.2 Configure Tivoli Access Manager -- 5.9.3 Configure WebSphere Portal Version 4.1.4 -- 5.9.4 Configuring WebSphere Portal to use Tivoli Access Manager -- 5.9.5 Configuring WebSEAL single sign-on -- 5.10 Conclusion -- Chapter 6. Federated single sign-on -- 6.1 Business requirements -- 6.2 Functional requirements -- 6.2.1 Risk assessment -- 6.3 Security design objectives.
6.4 Design approach -- 6.5 Implementation architecture -- 6.6 Technical implementation -- 6.6.1 Precondition -- 6.6.2 Sample Custom SOAP rpc Servlet -- 6.7 Conclusion -- Part 4 Appendixes -- Appendix A. mySAP Workplace integration guide -- Overview -- Version information -- Configuration -- WebSEAL configuration -- mySAP Workplace configuration -- Management issues -- User administration -- Appendix B. mySAP Enterprise Portal integration guide -- Overview -- Integration product version information -- Scenario 1 -- Configure WebSEAL -- Configure SAP Enterprise Portal -- Scenario 2 -- Configure WebSEAL -- Configure mySAP Enterprise Portal -- Other integration considerations -- Configuring network firewalls -- Known problems -- Tivoli Access Manager global sign-On (GSO) -- Creating a Tivoli Access Manager GSO resource -- Creating the WebSEAL GSO junction -- Creating and modifying WebSEAL users -- Creating a resource credential -- Configure back-end Web server for BA authentication -- GSO administration and management considerations -- Initial GSO credential population -- Multiple point of access -- GSO password management and synchronization -- Password synchronization between the same registry -- Password synchronization between Access Manager and NT domains -- Appendix C. Solaris installation guidelines -- Verify the current Solaris configuration -- DB2 Version 7.2 installation -- DB2 installation verification -- WebSphere Application Server installation -- WebSphere Application Server installation verification -- WebSphere Application Server security setup -- Personalization and portal installation -- WebSphere Portal verification -- Personalization Workspace verification -- Applying fixpacks -- WebSEAL configuration -- Summary of configuration files involved -- Configure WebSphere Application Server and WebSphere Portal.
Configure Tivoli Access Manager -- Set up SSO between WebSEAL and HTTP Server -- Pass WebSphere Portal authorization to Access Manager -- Enable SSL between WebSEAL and HTTP Server -- Improving Portal Server performance -- Sample configuration files -- Appendix D. CGI-program for inactivity timeout -- Appendix E. Additional material -- Locating the Web material -- Using the Web material -- How to use the Web material -- Glossary -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Index -- Back cover.
Record Nr. UNINA-9910824916403321
Bucker Axel  
San Jose, CA, : IBM, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Enterprise business portals II with IBM tivoli access manager [[electronic resource] /] / Axel Bucker et al
Enterprise business portals II with IBM tivoli access manager [[electronic resource] /] / Axel Bucker et al
Autore Bücker Axel
Pubbl/distr/stampa San Jose, CA, : IBM, 2003
Descrizione fisica xxii, 468 p. : ill
Disciplina 658.4/72
Altri autori (Persone) AntoniusJesper
RiexingerDieter
SommerFrank
SumidaAtsushi
Collana IBM redbooks
Soggetto topico Computer networks - Security measures
Web portals - Security measures
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910450476403321
Bücker Axel  
San Jose, CA, : IBM, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Enterprise business portals II with IBM tivoli access manager [[electronic resource] /] / Axel Bucker et al
Enterprise business portals II with IBM tivoli access manager [[electronic resource] /] / Axel Bucker et al
Autore Bücker Axel
Pubbl/distr/stampa San Jose, CA, : IBM, 2003
Descrizione fisica xxii, 468 p. : ill
Disciplina 658.4/72
Altri autori (Persone) AntoniusJesper
RiexingerDieter
SommerFrank
SumidaAtsushi
Collana IBM redbooks
Soggetto topico Computer networks - Security measures
Web portals - Security measures
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910783522603321
Bücker Axel  
San Jose, CA, : IBM, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui