2 options
Integrated identity management using IBM Tivoli security solutions / [Axel Bucker ... et al.].
- Format:
- Book
- Author/Creator:
- Bücker, Axel.
- Series:
- IBM redbooks.
- IBM redbooks
- Language:
- English
- Subjects (All):
- Electronic commerce--Security measures.
- Electronic commerce.
- Business enterprises--Computer networks--Security measures.
- Business enterprises.
- Computer networks--Access control.
- Computer networks.
- IBM Tivoli identity manager.
- Physical Description:
- 1 online resource (198 p.)
- Edition:
- 1st ed.
- Place of Publication:
- Austin, TX : IBM, International Technical Support Organization, c2004.
- Language Note:
- English
- Contents:
- Front cover
- Contents
- Notices
- Trademarks
- Preface
- The team that wrote this redbook
- Become a published author
- Comments welcome
- Part 1 Why Integrated Identity Management
- Chapter 1. An introduction to a new reference architecture
- 1.1 Everything is on demand today
- 1.2 Security management methods and practices
- 1.2.1 Confidentiality
- 1.2.2 Integrity
- 1.2.3 Availability
- 1.2.4 Areas of security implied in the CIA Triad
- 1.3 Business drivers
- 1.4 Issues affecting identity integration solutions
- 1.5 Integrated identity in the enterprise
- 1.5.1 Access control management
- 1.5.2 Identity and credential management
- 1.5.3 Audit management
- 1.5.4 Directory management
- 1.5.5 Privacy management
- 1.6 Conclusion
- Chapter 2. What Bank International
- 2.1 Company profile
- 2.1.1 Geographic distribution of WBI
- 2.1.2 Organization of WBI
- 2.1.3 HR and personnel procedures
- 2.2 Current IT architecture
- 2.2.1 Overview of the WBI network
- 2.2.2 Recently implemented e-business initiative
- 2.2.3 Security infrastructure deployed for the e-business initiative
- 2.2.4 Secured e-business initiative architecture
- 2.2.5 Identity management and emerging problems
- 2.3 Corporate business vision and objectives
- 2.4 Business requirements
- 2.4.1 Business requirements for phase 1
- 2.4.2 Business requirements for phase 2
- 2.5 Functional requirements
- 2.5.1 Phase 1
- 2.5.2 Phase 2
- 2.6 Risk assessment
- 2.6.1 WBI risk assessment
- 2.7 Security design objectives
- 2.7.1 Functional design objectives
- 2.7.2 Non-functional design objectives
- 2.8 Architectural decisions
- Chapter 3. Applying the reference architecture
- 3.1 Solution design and delivery approach
- 3.1.1 Implementation life-cycle
- 3.1.2 Requirements analysis
- 3.1.3 Incremental delivery strategy
- 3.2 WBI solution design.
- 3.2.1 Solution overview
- 3.2.2 Component model
- 3.2.3 The operational architecture
- 3.2.4 The security architecture
- 3.2.5 Implementation phases
- Chapter 4. Implementing the solution
- 4.1 Development environment overview
- 4.1.1 Component model
- 4.1.2 Operational model
- 4.1.3 Security architecture
- 4.2 Technical implementation
- 4.2.1 Automatic provisioning
- 4.2.2 Application subscription
- 4.2.3 Self care
- 4.2.4 Self registration
- 4.3 Conclusion
- Part 2 Appendixes
- Appendix A. ISO 17799 compliance mapping
- Corporate policy and standards
- Standards, practices, and procedures
- Practical example
- External standards and certifications
- Industry specific requirements
- Product or solution certifications
- Nationally and internationally recognized standards
- Legal requirements
- ISO 17799 and integrated identity management
- Summary
- Glossary
- Related publications
- IBM Redbooks
- How to get IBM Redbooks
- Help from IBM
- Index
- Back cover.
- Notes:
- "May 2004."
- "SG24-6054-00."
- Includes bibliographical references and index.
- OCLC:
- 61397302
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.