top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
AIX 5L version 5.2 security supplement [[electronic resource] /] / Steven Tuttle, Gabriel Pizano, Chris Smith
AIX 5L version 5.2 security supplement [[electronic resource] /] / Steven Tuttle, Gabriel Pizano, Chris Smith
Autore Tuttle Steven
Pubbl/distr/stampa Austin, TX, : IBM Corp., International Technical Support Organization, c2003
Descrizione fisica 1 online resource (198 p.)
Altri autori (Persone) PizanoGabriel
SmithChris
Collana Redbooks
Soggetto topico Operating systems (Computers)
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910450110003321
Tuttle Steven  
Austin, TX, : IBM Corp., International Technical Support Organization, c2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
AIX 5L version 5.2 security supplement [[electronic resource] /] / Steven Tuttle, Gabriel Pizano, Chris Smith
AIX 5L version 5.2 security supplement [[electronic resource] /] / Steven Tuttle, Gabriel Pizano, Chris Smith
Autore Tuttle Steven
Pubbl/distr/stampa Austin, TX, : IBM Corp., International Technical Support Organization, c2003
Descrizione fisica 1 online resource (198 p.)
Altri autori (Persone) PizanoGabriel
SmithChris
Collana Redbooks
Soggetto topico Operating systems (Computers)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910783529003321
Tuttle Steven  
Austin, TX, : IBM Corp., International Technical Support Organization, c2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
AIX 5L version 5.2 security supplement / / Steven Tuttle, Gabriel Pizano, Chris Smith
AIX 5L version 5.2 security supplement / / Steven Tuttle, Gabriel Pizano, Chris Smith
Autore Tuttle Steven
Pubbl/distr/stampa Austin, TX, : IBM Corp., International Technical Support Organization, c2003
Descrizione fisica 1 online resource (198 p.)
Altri autori (Persone) PizanoGabriel
SmithChris
Collana Redbooks
Soggetto topico Operating systems (Computers)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. AIX security flashes -- 1.1 Recommended reading -- 1.2 Security flash information by e-mail -- 1.3 Obtaining fixes -- Chapter 2. Virtual private networks -- 2.1 Architecture -- 2.2 Security -- 2.2.1 Transport mode -- 2.2.2 Tunnel mode -- 2.2.3 Security parameter index -- 2.2.4 Security associations -- 2.2.5 Filter rules -- 2.2.6 Encapsulating Security Payloads -- 2.2.7 Authentication Header -- 2.2.8 Key management -- 2.2.9 Security features -- 2.3 Installing IPSec -- 2.3.1 Installing the IP Security feature -- 2.3.2 Enabling IPSec offload -- 2.3.3 Starting IP Security -- 2.3.4 Installation Verification Procedure -- 2.4 Using administration interfaces -- 2.4.1 Starting IPSec -- 2.4.2 Stopping IPSec -- 2.4.3 IKE tunnels using SMIT -- 2.4.4 IKE tunnels using Web-based System Manager -- 2.4.5 Using certificates -- 2.4.6 Manual tunnels using the System Management Interface Tool -- 2.4.7 Filtering through the System Management Interface Tool -- 2.5 Functionality -- 2.5.1 Scenario I -- 2.5.2 Scenario II -- 2.5.3 Scenario III -- 2.5.4 Scenario IV -- 2.5.5 Scenario V -- 2.5.6 Scenario VI -- 2.6 Differences and limitations -- 2.7 Event and alert management -- 2.8 Common problems and solutions -- 2.8.1 Activation failure of the tunnel -- 2.8.2 Pinging from a non-secure machine to a secured machine hangs -- 2.8.3 Cannot ping from a secured machine to a non-secure machine -- 2.8.4 Network address translation doesn't work in IPSec environments -- 2.8.5 Firewall doesn't work in IPSec environments -- 2.8.6 Cannot connect two machines where tunnels used to be active -- 2.8.7 Both tunnels activated but there is no active/negotiating in the IKE tunnel monitor.
2.8.8 Can no longer connect from a non-secure machine to a secure machine with the tunnel active -- 2.8.9 IP security started but IKE command does not work -- 2.8.10 isakmpd is not running -- 2.8.11 The IKE subsystem group is inoperative -- 2.8.12 Tunnels are in a dormant state after running ike cmd=activate -- 2.8.13 Editing tunnel information with Web-based System Manager panels differs from ike cmd=list db verbose -- 2.8.14 Cannot activate a tunnel because the remote ID is invalid -- 2.8.15 General procedure to obtain the cause of problems -- Chapter 3. Exploiting Network Authentication Service -- 3.1 Architecture -- 3.1.1 Recommended reading -- 3.1.2 Ease-of-use example -- 3.2 Security -- 3.3 Installation example -- 3.3.1 Planning -- 3.3.2 Installation -- 3.3.3 Configuring the server -- 3.3.4 Configuring the client -- 3.3.5 Creating the keytab file -- 3.3.6 Kerberos administration -- 3.3.7 Changing authentication methods to allow Kerberos -- 3.3.8 Obtaining Kerberos authentication for administration -- 3.3.9 Creating a test user -- 3.3.10 Testing the user and services -- 3.3.11 Configuring another client system -- 3.3.12 Testing the user and services on the new host -- 3.4 Administration -- 3.4.1 AIX -- 3.4.2 Network Authentication Service -- 3.5 Functions -- 3.5.1 Integrated login -- 3.5.2 Secure remote commands -- 3.5.3 User management commands -- 3.6 Differences and limitations -- 3.7 Event and alert management -- 3.8 Common problems and solutions -- 3.8.1 Checklist -- 3.8.2 Logs -- 3.8.3 Typical problems -- Chapter 4. Pluggable Authentication Module -- 4.1 Architecture -- 4.1.1 PAM library -- 4.1.2 PAM modules -- 4.1.3 PAM configuration file -- 4.1.4 Recommended reading -- 4.2 Security -- 4.2.1 Security issues -- 4.3 Installing and configuring PAM -- 4.3.1 Installing PAM for AIX (pam_aix) -- 4.3.2 Installing PAM for LDAP (pam_ldap).
4.4 Common problems and solutions -- 4.4.1 Enabling PAM debug -- Chapter 5. Restricting users -- 5.1 Restricted shells -- 5.1.1 Recommended reading -- 5.1.2 Configuring the system and creating a restricted shell user -- 5.2 User limits for a system resource -- 5.2.1 Architecture -- 5.2.2 Security -- 5.2.3 Resources -- 5.2.4 Administration -- 5.3 User login controls -- 5.3.1 Setting up login controls -- 5.3.2 Changing the welcome message on the login display -- 5.3.3 Changing the login display for the CDE -- 5.3.4 Securing unattended terminals -- 5.3.5 Enforcing automatic logoff -- 5.4 Preventing denial-of-service attacks -- Appendix A. AIX Security Planning and Implementation Worksheet -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover.
Record Nr. UNINA-9910816215203321
Tuttle Steven  
Austin, TX, : IBM Corp., International Technical Support Organization, c2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Using LDAP for directory integration [[electronic resource] /] / [Steven Tuttle, Kedar Godbole, Grant McCarthy]
Using LDAP for directory integration [[electronic resource] /] / [Steven Tuttle, Kedar Godbole, Grant McCarthy]
Autore Tuttle Steven
Edizione [2nd ed.]
Pubbl/distr/stampa [S.l.], : IBM, International Technical Support Organization, c2004
Descrizione fisica 1 online resource (150 p.)
Altri autori (Persone) GodboleKedar
McCarthyGrant
Collana IBM redbooks
Soggetto topico LDAP (Computer network protocol)
Computer network protocols
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910449800703321
Tuttle Steven  
[S.l.], : IBM, International Technical Support Organization, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Using LDAP for directory integration [[electronic resource] /] / [Steven Tuttle, Kedar Godbole, Grant McCarthy]
Using LDAP for directory integration [[electronic resource] /] / [Steven Tuttle, Kedar Godbole, Grant McCarthy]
Autore Tuttle Steven
Edizione [2nd ed.]
Pubbl/distr/stampa [S.l.], : IBM, International Technical Support Organization, c2004
Descrizione fisica 1 online resource (150 p.)
Altri autori (Persone) GodboleKedar
McCarthyGrant
Collana IBM redbooks
Soggetto topico LDAP (Computer network protocol)
Computer network protocols
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910783564903321
Tuttle Steven  
[S.l.], : IBM, International Technical Support Organization, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Using LDAP for directory integration / / [Steven Tuttle, Kedar Godbole, Grant McCarthy]
Using LDAP for directory integration / / [Steven Tuttle, Kedar Godbole, Grant McCarthy]
Autore Tuttle Steven
Edizione [2nd ed.]
Pubbl/distr/stampa [S.l.], : IBM, International Technical Support Organization, c2004
Descrizione fisica 1 online resource (150 p.)
Altri autori (Persone) GodboleKedar
McCarthyGrant
Collana IBM redbooks
Soggetto topico LDAP (Computer network protocol)
Computer network protocols
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Summary of changes -- February 2004, Second Edition -- Chapter 1. Introduction to Directory Integration -- 1.1 Introduction -- 1.2 Directories -- 1.3 Advantages of using a directory -- 1.4 Directory Components -- 1.5 IBM Tivoli Directory Integrator -- 1.5.1 Directory Integrator software components -- 1.5.2 Solution building approach -- 1.6 IBM Tivoli Directory Server -- 1.7 IBM Lotus Domino 6.5 -- 1.8 Microsoft Active Directory -- 1.8.1 Naming contexts -- 1.8.2 Logical elements -- 1.8.3 Physical elements: sites and domain controllers -- 1.8.4 Architecture -- 1.8.5 The role of DNS -- 1.8.6 Special roles -- Chapter 2. Scenario 1: Domino and Active Directory -- 2.1 Scenario 1 -- 2.2 Synchronizing Active Directory and Domino Directory using ADSync -- 2.3 Installing the ADSync tool -- 2.4 Enabling Domino Directory synchronization -- 2.5 Registering users of Active Directory -- 2.5.1 Registering existing Active Directory users in Domino -- 2.5.2 Registering new users in both Active Directory and Domino -- 2.6 Registering users using the Domino Administrator client -- 2.7 Deleting users -- 2.7.1 Deleting users with Active Directory -- 2.7.2 Deleting users with the Domino Administrator client -- 2.8 Data synchronization using Directory Integrator -- Chapter 3. Scenario 2: Directory Server and Active Directory -- 3.1 Introduction -- 3.2 Scenario 2 -- 3.2.1 The Test Environment -- 3.2.2 The testing procedure -- 3.3 Installation and configuration of Directory Integrator -- 3.3.1 Installation of Directory Integrator -- 3.3.2 Configuration of Directory Integrator -- Chapter 4. Scenario 3: Directory Server and Domino -- 4.1 Scenario 3A -- 4.1.1 Prerequisites -- 4.1.2 Importing data using Directory Integrator.
4.1.3 Importing data into Directory Server -- 4.2 Scenario 3B -- 4.2.1 Importing data into the Domino Directory -- 4.2.2 Synchronization between Directory Server and Domino Directory -- 4.3 Scenario 3C -- 4.3.1 LDAP Domino Upgrade Service -- 4.3.2 Migrating entries from LDAP Directory into a Domino Directory -- Chapter 5. Scenario 4: Integrating data from three different sources -- 5.1 Scenario 4 -- 5.2 Building the Assembly Line -- 5.2.1 The File System Connector -- 5.2.2 The Lookup Connectors -- 5.2.3 The AddOnly connector -- 5.2.4 The Update connector -- 5.3 The result -- Appendix A. Configurations -- Directory Server -- Operating System -- Directory Server setup -- IBM Lotus Domino Server -- Operating System -- IBM Lotus Domino 6.5 setup -- Microsoft Active Directory -- Operating System -- Microsoft Active Directory setup -- Appendix B. LDAP standards -- LDAP standards -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover.
Record Nr. UNINA-9910825196903321
Tuttle Steven  
[S.l.], : IBM, International Technical Support Organization, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui