Develop and deploy a secure portal solution using WebSphere Portal V5 and Tivoli Access Manager V5.1 [[electronic resource] /] / [John Ganci ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Research Triangle Park, NC, : IBM, International Technical Support Organization, 2004 |
Descrizione fisica | xx, 702 p. : ill |
Disciplina | 005.8 |
Altri autori (Persone) | GanciJohn |
Collana | IBM redbooks |
Soggetto topico | Web portals - Security measures |
Soggetto genere / forma | Electronic books. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910449867103321 |
Research Triangle Park, NC, : IBM, International Technical Support Organization, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Develop and deploy a secure portal solution using WebSphere Portal V5 and Tivoli Access Manager V5.1 [[electronic resource] /] / [John Ganci ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Research Triangle Park, NC, : IBM, International Technical Support Organization, 2004 |
Descrizione fisica | xx, 702 p. : ill |
Disciplina | 005.8 |
Altri autori (Persone) | GanciJohn |
Collana | IBM redbooks |
Soggetto topico | Web portals - Security measures |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910783526303321 |
Research Triangle Park, NC, : IBM, International Technical Support Organization, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Develop and deploy a secure portal solution using WebSphere Portal V5 and Tivoli Access Manager V5.1 / / [John Ganci ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Research Triangle Park, NC, : IBM, International Technical Support Organization, 2004 |
Descrizione fisica | xx, 702 p. : ill |
Disciplina | 005.8 |
Altri autori (Persone) | GanciJohn |
Collana | IBM redbooks |
Soggetto topico | Web portals - Security measures |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Introduction to secure portal solutions -- Chapter 1. Introduction -- 1.1 Secure portal solution overview -- 1.1.1 Key concepts of a secure portal solution -- 1.1.2 Secure portal solution high level architecture -- 1.2 Solution software -- 1.2.1 Runtime environment solution software -- 1.2.2 Development environment solution software -- 1.3 Target audience of redbook -- 1.3.1 Roles and skills -- 1.3.2 Matching redbook topics to roles and skills -- Chapter 2. Security fundamentals -- 2.1 Security domain and risk management -- 2.1.1 Source of vulnerability and intruder reconnaissance -- 2.1.2 Physical security -- 2.1.3 Logical security -- 2.1.4 Security policy -- 2.1.5 Security risk management -- 2.2 Method for Architecting Secure Solutions (MASS) -- 2.3 Security fundamentals -- 2.3.1 Public Key Infrastructure (PKI) -- 2.3.2 WebSphere Portal security model -- 2.3.3 Tivoli Access Manager security model -- 2.3.4 Authentication -- 2.3.5 Authorization -- 2.3.6 WebSphere Portal Credential Vault -- 2.3.7 Tivoli Access Manager Global Sign-on (GSO) -- Chapter 3. Architecture and topology selection -- 3.1 Topology definition and operational model -- 3.1.1 Operational model overview -- 3.1.2 Topology zones -- 3.1.3 Conceptual model -- 3.1.4 Specified model -- 3.1.5 Security interaction patterns -- 3.2 Runtime environment topology selection -- 3.2.1 Entry runtime topology -- 3.2.2 Enterprise runtime topology -- 3.2.3 Extended enterprise runtime topology -- 3.3 Development environment topology selection -- 3.3.1 Conceptual model -- 3.3.2 Specified model -- 3.3.3 All-in-one approach -- 3.3.4 Develop and deploy without debug -- 3.3.5 Develop, deploy, and remote debugging.
3.3.6 Develop using a shared security infrastructure -- Chapter 4. Design and integration guidelines -- 4.1 Security and design guidelines -- 4.1.1 Design principles -- 4.1.2 WebSphere Portal vs Tivoli Access Manager authorization -- 4.1.3 Single sign-on guidelines -- 4.1.4 Identity management -- 4.1.5 Adding an external Web server for WebSphere Portal -- 4.2 Product-specific integration guidelines -- 4.2.1 WebSEAL junctions -- 4.2.2 Junction considerations for use with TAI -- 4.2.3 Handling of back-end application cookies -- 4.2.4 Junction Mapping Table (JMT) -- 4.2.5 WebSEAL URL-based access control -- 4.2.6 Access control of WebSphere Portal resources -- 4.2.7 Access control of resources within portlet applications -- 4.2.8 WebSEAL and WebSphere Portal session considerations -- 4.3 Sequence diagrams for common access patterns -- 4.3.1 UCT1: Access unprotected portal page -- 4.3.2 UCT2: Access protected portal page, provide valid credentials -- 4.3.3 UCT3: Access protected portal page with existing valid session -- 4.3.4 UCT4: Access protected portal page with invalid credentials -- 4.3.5 UCT5: WebSEAL session times out before portal session -- 4.3.6 UCT6: Portal session times out before WebSEAL session -- 4.3.7 UCT7: Both WebSEAL and WebSphere Portal sessions time out -- 4.3.8 UCT8: WebSphere Portal logout after WebSEAL session timeout -- 4.4 Component connections -- Part 2 ITSO working example secure portal solution -- Chapter 5. Requirements and solution design -- 5.1 Business scenario -- 5.1.1 Initial context -- 5.1.2 Business challenges -- 5.2 Business requirements -- 5.2.1 Functional requirements -- 5.2.2 Non-functional requirements -- 5.3 Use case model -- 5.3.1 Use case overview -- 5.3.2 Front-end use cases -- 5.3.3 Administrative use cases -- 5.4 Architecture -- 5.4.1 Architecture overview -- 5.4.2 Architecture decisions. 5.4.3 Selected runtime environment -- 5.4.4 Selected development environment -- Chapter 6. Install the runtime environment -- 6.1 Planning -- 6.1.1 Hardware and software prerequisites -- 6.1.2 Hardware used within the ITSO runtime environment -- 6.1.3 Software used within the ITSO runtime environment -- 6.1.4 Software installation paths and variables -- 6.1.5 Using VMWare and Ghost -- 6.2 Implement the Policy Server node -- 6.2.1 Windows 2000 Server installation -- 6.2.2 DB2 Universal Database installation -- 6.2.3 IBM GSKit upgrade installation -- 6.2.4 Java Runtime Environment (JRE) V1.3.1 installation -- 6.2.5 Tivoli Directory Server installation -- 6.2.6 Tivoli Directory Server configuration -- 6.2.7 Tivoli Web Administration Tool installation -- 6.2.8 Configure Directory Server for Tivoli Access Manager -- 6.2.9 Tivoli Access Manager installation -- 6.2.10 Tivoli Access Manager configuration -- 6.2.11 Tivoli Access Manager Web Portal Manager installation -- 6.2.12 Tivoli Access Manager V5.1 Base Fixpack 2 installation -- 6.3 Implement the Reverse Proxy node -- 6.3.1 Windows 2000 Server installation -- 6.3.2 Install GSKit -- 6.3.3 Install Java Runtime Environment (JRE) -- 6.3.4 Install Tivoli Directory Client -- 6.3.5 Tivoli Access Manager - WebSEAL installation -- 6.3.6 Tivoli Access Manager - WebSEAL configuration -- 6.3.7 Tivoli Access Manager V5.1 Base Fixpack 2 installation -- 6.3.8 Tivoli Access Manager V5.1 WebSEAL Fixpack 2 installation -- 6.4 Implement the Portal Server node -- 6.4.1 Windows 2000 Server installation -- 6.4.2 WebSphere Portal Server V5.0 installation -- 6.4.3 WebSphere Application Server Enterprise V5 Fixpack 2 (V5.0.2) installation -- 6.4.4 WebSphere Application Server V5.0.2 Fixes installation -- 6.4.5 WebSphere Portal V5 Fixpack 2 (V5.0.2) installation. 6.4.6 WebSphere Application Server Enterprise V5.0.2 Cumulative Fix (V5.0.2.3) installation -- 6.4.7 WebSphere Portal V5.0.2 Cumulative Fix 1 (V5.0.2.1) installation -- 6.4.8 Java Runtime Environment (JRE) V1.3.1 installation -- 6.4.9 Tivoli Access Manager Java Runtime Environment installation -- 6.4.10 DB2 Universal Database installation -- Chapter 7. Configure the runtime environment -- 7.1 Configure WebSphere Portal for DB2 -- 7.2 Configure WebSphere Portal for IBM HTTP Server -- 7.3 Configure WebSphere Portal for LDAP -- 7.3.1 Create a suffix -- 7.3.2 Create LDIF file containing users and groups -- 7.3.3 Import the LDIF file (wp-itso.ldif) to create users and groups -- 7.3.4 Enable LDAP security for WebSphere Portal -- 7.3.5 Verify the LDAP configuration -- 7.4 Enable mutual SSL between WebSEAL and WebSphere Portal -- 7.4.1 IBM HTTP Server SSL configuration -- 7.4.2 Configure WebSphere Portal for SSL -- 7.4.3 Export IBM HTTP Server CA certificate -- 7.4.4 Import IBM HTTP Server certificate into WebSEAL keystore -- 7.4.5 Export WebSEAL certificate -- 7.4.6 Import WebSEAL certificate into IBM HTTP Server keystore -- 7.4.7 Enable mutual SSL for IBM HTTP Server -- 7.5 Configure portal authentication with TAM using TAI -- 7.5.1 Apply Tivoli Access Manager ACLs to new LDAP suffixes -- 7.5.2 Define additional MIME types for WebSphere Application Server -- 7.5.3 Create a WebSEAL junction -- 7.5.4 Enable forms authentication on WebSEAL -- 7.5.5 Configure WebSEAL to modify URLs to back-end systems -- 7.5.6 Configure additional WebSEAL parameters -- 7.5.7 Import WebSphere Portal users and groups into TAM -- 7.5.8 Define access controls for WebSphere Portal URIs -- 7.5.9 Configure the junction mapping table -- 7.5.10 Configure SSO for WebSEAL and WebSphere via TAI -- 7.5.11 Configure Portal login/logout for use with WebSEAL. 7.6 Configure Portal for authorization with TAM -- 7.6.1 Configure the SSL between WebSphere and TAM -- 7.6.2 Implement JAAS authentication -- 7.6.3 Modify WebSphere Portal configuration files -- 7.6.4 Verify entries in TAM for Portal external authorization -- 7.6.5 Example for externalizing a resource -- 7.7 Integrate the Credential Vault -- 7.7.1 Credential Vault overview -- 7.7.2 Configure the Credential Vault for Tivoli Access Manager -- 7.7.3 Verify the Credential Vault -- 7.8 Additional configuration -- 7.8.1 Configure WebSEAL and WebSphere Portal sesssion timeouts -- 7.8.2 Configure WebSEAL to handle favicon.ico -- Chapter 8. Implement the development environment -- 8.1 Planning -- 8.1.1 Architecture overview -- 8.1.2 Hardware used within the ITSO development environment -- 8.1.3 Software used within the ITSO development environment -- 8.1.4 VMWare -- 8.2 Implement the Repository node (optional) -- 8.3 Implement the Policy Server node -- 8.4 Implement the Reverse Proxy node (optional) -- 8.5 Implement the Development node -- 8.5.1 Windows 2000 installation -- 8.5.2 WebSphere Studio Application Developer V5.1.1 installation -- 8.5.3 WebSphere Studio Application Developer V5.1.1 Interim Fix 002 installation -- 8.5.4 WebSphere Studio Application Developer - WebSphere Test Environment fixpack installation -- 8.5.5 WebSphere Portal Toolkit and test environment installation -- 8.5.6 Verify the Portal Toolkit and Test Environment installation -- 8.5.7 Java Runtime Environment (JRE) V1.3.1 installation -- 8.5.8 Tivoli Access Manager Java Runtime Environment installation -- 8.5.9 Configure the SSL between the WTE and TAM -- 8.5.10 Verify the TAM configuration within WebSphere Studio -- 8.5.11 CVS client configuration for WebSphere Studio -- 8.6 Configure WebSphere Portal for LDAP -- 8.6.1 Create a suffix. 8.6.2 Import the LDIF file (wp-itso.ldif) to create users and groups. |
Record Nr. | UNINA-9910815713803321 |
Research Triangle Park, NC, : IBM, International Technical Support Organization, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Enterprise business portals II with IBM tivoli access manager / / Axel Bucker et al |
Autore | Bucker Axel |
Pubbl/distr/stampa | San Jose, CA, : IBM, 2003 |
Descrizione fisica | xxii, 468 p. : ill |
Disciplina | 658.4/72 |
Altri autori (Persone) |
AntoniusJesper
RiexingerDieter SommerFrank SumidaAtsushi |
Collana | IBM redbooks |
Soggetto topico |
Computer networks - Security measures
Web portals - Security measures |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover -- Contents -- Figures -- Tables -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Integration design and architecture -- Chapter 1. IBM WebSphere Portal integration -- 1.1 WebSphere Portal offerings -- 1.1.1 WebSphere Portal Enable -- 1.1.2 WebSphere Portal Extend -- 1.1.3 WebSphere Portal Experience -- 1.2 WebSphere Portal architecture -- 1.2.1 Presentation services -- 1.2.2 WebSphere Portal infrastructure -- 1.2.3 Tivoli Access Manager integration architecture -- 1.3 WebSphere Portal security -- 1.3.1 Authentication -- 1.3.2 Authorization -- 1.3.3 Administration -- 1.4 WebSphere Portal and Tivoli Access Manager -- 1.4.1 Tivoli Access Manager added value -- 1.4.2 Tivoli Access Manager managing WebSphere Portal resources -- Chapter 2. SAP Workplace and SAP Enterprise Portal integration -- 2.1 mySAP.com portfolio -- 2.1.1 mySAP.com Workplace -- 2.1.2 SAP Enterprise Portal -- 2.2 mySAP.com Workplace -- 2.2.1 SAP Workplace architecture -- 2.2.2 SAP Workplace security -- 2.3 SAP Workplace using Tivoli Access Manager -- 2.3.1 Access Manager added value -- 2.3.2 Access Manager integration architecture -- 2.4 SAP Portal -- 2.4.1 Introduction -- 2.4.2 SAP Enterprise Information Portal architecture -- 2.4.3 SAP Enterprise Portal security -- 2.5 SAP Portal security using Tivoli Access Manager -- 2.5.1 Access Manager added value -- 2.5.2 Access Manager integration architecture -- Chapter 3. Web Services integration -- 3.1 General business environment -- 3.2 Web Services definition -- 3.2.1 Web Services model -- 3.3 Web Services for real business -- 3.3.1 Security overview -- 3.3.2 XKMS overview -- 3.3.3 SAML overview -- 3.3.4 Summary -- 3.4 Security integration with Tivoli Access Manager -- 3.4.1 Introduction -- 3.4.2 Security models.
3.4.3 Administration of Web Services with aznAPI -- 3.4.4 Configuration of Web Services with Tivoli Access Manager -- Part 2 Automobile industry solution -- Chapter 4. Automobile industry solution -- 4.1 Group structure and company profile -- 4.2 Current architecture -- 4.3 Corporate business vision and objectives -- 4.4 Project layout and implementation phases -- 4.5 Business requirements -- 4.6 Functional requirements -- 4.6.1 Risk assessment -- 4.7 Security design objectives -- 4.8 Design approach -- 4.9 Implementation architecture -- 4.9.1 Single sign-on architecture -- 4.9.2 Infrastructure -- 4.9.3 Authorization architecture -- 4.10 Technical implementation -- 4.10.1 Implementing the portal platform -- 4.10.2 SAP ITS integration -- 4.10.3 Exchange 2000 integration -- 4.10.4 Lotus QuickPlace integration -- 4.10.5 Integrating Business Intelligence -- 4.10.6 Performing risk assessment -- 4.11 Conclusion -- Part 3 Retail industry solution -- Chapter 5. Retailer industry solution -- 5.1 Company structure and profile -- 5.2 Current architecture -- 5.3 Corporate business vision and objectives -- 5.4 Project layout and implementation -- 5.5 Business requirements -- 5.6 Functional requirements -- 5.6.1 Risk assessment -- 5.7 Security design objectives -- 5.8 Implementation architecture -- 5.8.1 Integration of Tivoli Access Manager into the architecture -- 5.8.2 Integration of WebSphere Portal into the architecture -- 5.9 Technical implementation -- 5.9.1 System setup -- 5.9.2 Configure Tivoli Access Manager -- 5.9.3 Configure WebSphere Portal Version 4.1.4 -- 5.9.4 Configuring WebSphere Portal to use Tivoli Access Manager -- 5.9.5 Configuring WebSEAL single sign-on -- 5.10 Conclusion -- Chapter 6. Federated single sign-on -- 6.1 Business requirements -- 6.2 Functional requirements -- 6.2.1 Risk assessment -- 6.3 Security design objectives. 6.4 Design approach -- 6.5 Implementation architecture -- 6.6 Technical implementation -- 6.6.1 Precondition -- 6.6.2 Sample Custom SOAP rpc Servlet -- 6.7 Conclusion -- Part 4 Appendixes -- Appendix A. mySAP Workplace integration guide -- Overview -- Version information -- Configuration -- WebSEAL configuration -- mySAP Workplace configuration -- Management issues -- User administration -- Appendix B. mySAP Enterprise Portal integration guide -- Overview -- Integration product version information -- Scenario 1 -- Configure WebSEAL -- Configure SAP Enterprise Portal -- Scenario 2 -- Configure WebSEAL -- Configure mySAP Enterprise Portal -- Other integration considerations -- Configuring network firewalls -- Known problems -- Tivoli Access Manager global sign-On (GSO) -- Creating a Tivoli Access Manager GSO resource -- Creating the WebSEAL GSO junction -- Creating and modifying WebSEAL users -- Creating a resource credential -- Configure back-end Web server for BA authentication -- GSO administration and management considerations -- Initial GSO credential population -- Multiple point of access -- GSO password management and synchronization -- Password synchronization between the same registry -- Password synchronization between Access Manager and NT domains -- Appendix C. Solaris installation guidelines -- Verify the current Solaris configuration -- DB2 Version 7.2 installation -- DB2 installation verification -- WebSphere Application Server installation -- WebSphere Application Server installation verification -- WebSphere Application Server security setup -- Personalization and portal installation -- WebSphere Portal verification -- Personalization Workspace verification -- Applying fixpacks -- WebSEAL configuration -- Summary of configuration files involved -- Configure WebSphere Application Server and WebSphere Portal. Configure Tivoli Access Manager -- Set up SSO between WebSEAL and HTTP Server -- Pass WebSphere Portal authorization to Access Manager -- Enable SSL between WebSEAL and HTTP Server -- Improving Portal Server performance -- Sample configuration files -- Appendix D. CGI-program for inactivity timeout -- Appendix E. Additional material -- Locating the Web material -- Using the Web material -- How to use the Web material -- Glossary -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Index -- Back cover. |
Record Nr. | UNINA-9910824916403321 |
Bucker Axel | ||
San Jose, CA, : IBM, 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Enterprise business portals II with IBM tivoli access manager [[electronic resource] /] / Axel Bucker et al |
Autore | Bücker Axel |
Pubbl/distr/stampa | San Jose, CA, : IBM, 2003 |
Descrizione fisica | xxii, 468 p. : ill |
Disciplina | 658.4/72 |
Altri autori (Persone) |
AntoniusJesper
RiexingerDieter SommerFrank SumidaAtsushi |
Collana | IBM redbooks |
Soggetto topico |
Computer networks - Security measures
Web portals - Security measures |
Soggetto genere / forma | Electronic books. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910450476403321 |
Bücker Axel | ||
San Jose, CA, : IBM, 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Enterprise business portals II with IBM tivoli access manager [[electronic resource] /] / Axel Bucker et al |
Autore | Bücker Axel |
Pubbl/distr/stampa | San Jose, CA, : IBM, 2003 |
Descrizione fisica | xxii, 468 p. : ill |
Disciplina | 658.4/72 |
Altri autori (Persone) |
AntoniusJesper
RiexingerDieter SommerFrank SumidaAtsushi |
Collana | IBM redbooks |
Soggetto topico |
Computer networks - Security measures
Web portals - Security measures |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910783522603321 |
Bücker Axel | ||
San Jose, CA, : IBM, 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Identity and access management solutions [[electronic resource] ] : using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1 / / John Ganci ... [et al.] |
Autore | Ganci John |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Research Triangle Park, N.C., : IBM, International Technical Support Organization, 2005 |
Descrizione fisica | xviii, 608 p. : ill |
Altri autori (Persone) | GanciJohn |
Collana | Redbooks |
Soggetto topico |
Web portals - Security measures
Computer networks - Security measures Computers - Access control |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910783544003321 |
Ganci John | ||
Research Triangle Park, N.C., : IBM, International Technical Support Organization, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Identity and access management solutions [[electronic resource] ] : using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1 / / John Ganci ... [et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Research Triangle Park, N.C., : IBM, International Technical Support Organization, 2005 |
Descrizione fisica | xviii, 608 p. : ill |
Altri autori (Persone) | GanciJohn |
Collana | Redbooks |
Soggetto topico |
Web portals - Security measures
Computer networks - Security measures Computers - Access control |
Soggetto genere / forma | Electronic books. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910450463403321 |
Research Triangle Park, N.C., : IBM, International Technical Support Organization, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Identity and access management solutions : using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1 / / John Ganci ... [et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Research Triangle Park, N.C., : IBM, International Technical Support Organization, 2005 |
Descrizione fisica | xviii, 608 p. : ill |
Altri autori (Persone) | GanciJohn |
Collana | Redbooks |
Soggetto topico |
Web portals - Security measures
Computer networks - Security measures Computers - Access control |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Introduction to identity and access management -- Chapter 1. Introduction -- 1.1 Introduction to identity and access management -- 1.1.1 Key concepts -- 1.1.2 High level solution architecture -- 1.2 Solution software -- 1.2.1 Runtime environment solution software -- 1.2.2 Development environment solution software -- 1.3 Target audience -- 1.3.1 Roles and skills -- 1.3.2 Matching redbook topics to roles and skills -- Chapter 2. Architecture and design guidelines -- 2.1 Operational modeling guidelines -- 2.1.1 Operational model overview -- 2.1.2 Topology zones -- 2.1.3 Application architecture components -- 2.1.4 Product mapping -- 2.1.5 Runtime environment topology selection -- 2.1.6 Development environment topology selection -- 2.2 Design principles -- 2.2.1 Centralized authority -- 2.2.2 Access decision evaluated on demand -- 2.2.3 Capture authentication events and logs -- 2.3 User provisioning guidelines -- 2.3.1 Identity management overview -- 2.3.2 Common LDAP directory -- 2.3.3 Tivoli Identity Manager services, workflows, and policies -- 2.3.4 Tivoli Directory Integrator assembly lines -- 2.3.5 Tivoli Directory Integrator connectors -- 2.4 Single sign-on authentication guidelines -- 2.4.1 WebSphere Portal authentication -- 2.4.2 DB2 Content Manager authentication -- 2.4.3 Single sign-on for WebSphere Portal and Content Manager -- 2.4.4 Single sign-on authentication using Tivoli Access Manager -- 2.5 Authorization guidelines -- 2.5.1 WebSphere Portal authorization -- 2.5.2 DB2 Content Manager authorization -- 2.5.3 Tivoli Access Manager authorization -- 2.5.4 WebSphere Portal vs. Tivoli Access Manager authorization -- 2.6 Product-specific integration guidelines -- 2.6.1 WebSEAL junctions.
2.6.2 Junction considerations for use with TAI -- 2.6.3 Handling of back-end application cookies -- 2.6.4 Junction Mapping Table (JMT) -- 2.6.5 WebSEAL URL-based access control -- 2.6.6 Access control of WebSphere Portal resources -- 2.6.7 Access control of resources within portlet applications -- 2.6.8 WebSEAL and WebSphere Portal session considerations -- 2.7 Sequence diagrams for common access patterns -- 2.7.1 UCT1: Access unprotected portal page -- 2.7.2 UCT2: Access protected portal page, provide valid credentials -- 2.7.3 UCT3: Access protected portal page with existing valid session -- 2.7.4 UCT4: Access protected portal page with invalid credentials -- 2.7.5 UCT5: WebSEAL session times out before portal session -- 2.7.6 UCT6: Portal session times out before WebSEAL session -- 2.7.7 UCT7: Both WebSEAL and WebSphere Portal sessions time out -- 2.7.8 UCT8: WebSphere Portal logout after WebSEAL session timeout -- Part 2 ITSO identity and access management working example -- Chapter 3. Requirements analysis and solution design -- 3.1 Business scenario -- 3.1.1 Initial context -- 3.1.2 Business challenges -- 3.2 Business requirements -- 3.2.1 Functional requirements -- 3.2.2 Non-functional requirements -- 3.3 Use case model -- 3.3.1 Use case overview -- 3.3.2 Use case details -- 3.4 Solution architecture -- 3.4.1 Architecture overview -- 3.4.2 Architectural decisions -- 3.4.3 Solution architecture details -- 3.4.4 Runtime topology and product mapping -- 3.4.5 Development environment topology and product mapping -- Chapter 4. Runtime environment installation -- 4.1 Planning -- 4.1.1 Hardware and software prerequisites -- 4.1.2 Hardware used within the ITSO runtime environment -- 4.1.3 Software used within the ITSO runtime environment -- 4.2 Directory node installation -- 4.2.1 Windows 2000 Server installation. 4.2.2 DB2 Universal Database V8.2 installation -- 4.2.3 IBM GSKit installation -- 4.2.4 WebSphere Application Server V5.0.2 installation -- 4.2.5 Tivoli Directory Server V5.2 installation -- 4.2.6 Tivoli Directory Server configuration -- 4.2.7 Tivoli Web Administration Tool configuration -- 4.2.8 Tivoli Directory Integrator installation -- 4.2.9 DB2 Information Integrator for Content installation -- 4.3 Access Manager node installation -- 4.3.1 Windows 2000 Server installation -- 4.3.2 IBM Java Runtime Environment (JRE) V1.3.1 installation -- 4.3.3 IBM GSKit installation -- 4.3.4 Tivoli Directory Client SDK 5.2 installation -- 4.3.5 WebSphere Application Server V5.0.2 installation -- 4.3.6 Configure Directory Server for Tivoli Access Manager -- 4.3.7 Tivoli Access Manager installation -- 4.3.8 Tivoli Access Manager configuration -- 4.3.9 Tivoli Access Manager Web Portal Manager installation -- 4.3.10 Tivoli Access Manager V5.1 Base Fixpack 9 installation -- 4.3.11 Configure Web Portal Manager -- 4.3.12 Verify the Web Portal Manager -- 4.3.13 Tivoli Identity Manager Agent for TAM installation -- 4.3.14 Tivoli Identity Manager Agent for TAM configuration -- 4.4 Reverse Proxy node installation -- 4.4.1 Windows 2000 Server installation -- 4.4.2 Java Runtime Environment (JRE) V1.3.1 installation -- 4.4.3 IBM GSKit installation -- 4.4.4 Tivoli Directory Client installation -- 4.4.5 Tivoli Access Manager: WebSEAL installation -- 4.4.6 Tivoli Access Manager: WebSEAL configuration -- 4.4.7 Tivoli Access Manager V5.1 Base Fixpack 9 installation -- 4.4.8 Tivoli Access Manager V5.1 WebSEAL Fixpack 9 installation -- 4.5 Identity Management node installation -- 4.5.1 Windows 2000 Server installation -- 4.5.2 DB2 Universal Database V8.2 installation -- 4.5.3 IBM GSKit V7.0.3.8 installation -- 4.5.4 Tivoli Directory Server V5.2 installation. 4.5.5 Tivoli Directory Server configuration -- 4.5.6 WebSphere Application Server V5.1 -- 4.5.7 Tivoli Identity Manager V4.5.1 Fixpack 16 (full install) -- 4.5.8 Install Tivoli Identity Manager V4.5.1 FP42 -- 4.5.9 Tivoli Identity Manager Agent for TAM profile configuration -- 4.6 Content Management node installation -- 4.6.1 Windows 2000 Server installation -- 4.6.2 Tivoli Directory Client SDK installation -- 4.6.3 WebSphere Application Server V5.1.1 installation -- 4.6.4 DB2 Universal Database V8.2 installation -- 4.6.5 Create user IDs with privileges for Content Manager -- 4.6.6 DB2 Content Manager V8.3 installation -- 4.6.7 DB2 Content Manager V8.3 Client for Windows installation -- 4.7 Portal Server node installation -- 4.7.1 Windows 2000 Server installation -- 4.7.2 WebSphere Portal V5.1 installation -- 4.7.3 IBM HTTP Server and WebSphere plug-in installation -- 4.7.4 Java Runtime Environment (JRE) V1.3.1 installation -- 4.7.5 Tivoli Access Manager Java Runtime Environment installation -- 4.7.6 DB2 UDB V8.2 ESE installation -- 4.7.7 DB2 UDB Client configuration to Content Manager -- 4.7.8 Information Integrator for Content V8.3 installation -- 4.7.9 Tivoli Identity Manager V4.5.1 API installation -- Chapter 5. Runtime environment configuration -- 5.1 Configure WebSphere Portal for DB2 UDB -- 5.1.1 Create a DB2 user for WebSphere Portal -- 5.1.2 Create DB2 UDB databases for WebSphere Portal -- 5.1.3 Migrate the data from Cloudscape to DB2 UDB -- 5.2 Configure WebSphere Portal with IBM HTTP Server -- 5.2.1 IBM HTTP Server configuration -- 5.2.2 Configure WebSphere Portal for the external IBM HTTP Server -- 5.3 Configure WebSphere Portal with LDAP -- 5.3.1 Create a suffix -- 5.3.2 Create LDIF file containing users and groups -- 5.3.3 Import the LDIF file (wp-itso.ldif) to create users and groups -- 5.3.4 Enable LDAP security for WebSphere Portal. 5.3.5 Verify the LDAP configuration -- 5.4 Configure DB2 Content Manager with LDAP -- 5.4.1 Back up the DB2 Content Manager databases -- 5.4.2 Generate the cmbcmenv.properties file -- 5.4.3 Copy the cmbcmenv.properties file -- 5.4.4 Copy the icmxlslg.dll (user exit) -- 5.4.5 Enable trusted logons for Library Server -- 5.4.6 Create the ClientUserEditSSO privilege sets -- 5.4.7 Test the configuration -- 5.4.8 Configure LTPA for WebSphere Application Server -- 5.4.9 Enable SSL for LDAP server communication -- 5.5 Enable mutual SSL between WebSEAL and Portal -- 5.5.1 IBM HTTP Server SSL configuration -- 5.5.2 Configure WebSphere Portal for SSL -- 5.5.3 Export IBM HTTP Server CA certificate -- 5.5.4 Import IBM HTTP Server certificate into WebSEAL keystore -- 5.5.5 Export WebSEAL certificate -- 5.5.6 Import WebSEAL certificate into IBM HTTP Server keystore -- 5.5.7 Enable mutual SSL for IBM HTTP Server -- 5.6 Configure Portal authentication with TAM using TAI -- 5.6.1 Apply Tivoli Access Manager ACLs to new LDAP suffixes -- 5.6.2 Define additional MIME types for WebSphere Application Server -- 5.6.3 Create a WebSEAL junction -- 5.6.4 Enable forms authentication on WebSEAL -- 5.6.5 Configure WebSEAL to modify URLs to back-end systems -- 5.6.6 Configure additional WebSEAL parameters -- 5.6.7 Import WebSphere Portal users and groups into TAM -- 5.6.8 Define access controls for WebSphere Portal URIs -- 5.6.9 Configure the junction mapping table (JMT) -- 5.6.10 Configure SSO for WebSEAL and WebSphere via TAI -- 5.6.11 Configure Portal login/logout for use with WebSEAL -- 5.7 Configure WebSphere Portal authorization with TAM -- 5.7.1 Configure SSL between WebSphere and TAM -- 5.7.2 Configure WebSphere Portal authorization for TAM -- 5.7.3 Verify entries in TAM for Portal external authorization -- 5.8 Configure reverse password synchronization. 5.8.1 Prerequisites. |
Record Nr. | UNINA-9910816209003321 |
Research Triangle Park, N.C., : IBM, International Technical Support Organization, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Migrating applications from microsoft DNA to IBM WebSphere [[electronic resource] /] / Edward Oguejiofor et al |
Autore | Oguejiofor Edward |
Pubbl/distr/stampa | Research Triangle Park, N.C., : IBM, International Technical Support Organization, 2005 |
Descrizione fisica | 1 online resource (342 p.) |
Disciplina | 006.7/6 |
Altri autori (Persone) |
KovariPeter
MavriRobert NagarajanShyam RehmanAshar SommerhauserGerd StecknerThomas |
Collana | Redbooks |
Soggetto topico | Web portals - Security measures |
Soggetto genere / forma | Electronic books. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910449758003321 |
Oguejiofor Edward | ||
Research Triangle Park, N.C., : IBM, International Technical Support Organization, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|