My Account Log in

2 options

Integrated identity management using IBM Tivoli security solutions / [Axel Bucker ... et al.].

Ebook Central Academic Complete Available online

View online

Ebook Central College Complete Available online

View online
Format:
Book
Author/Creator:
Bücker, Axel.
Contributor:
Bücker, Axel.
International Business Machines Corporation. International Technical Support Organization.
Series:
IBM redbooks.
IBM redbooks
Language:
English
Subjects (All):
Electronic commerce--Security measures.
Electronic commerce.
Business enterprises--Computer networks--Security measures.
Business enterprises.
Computer networks--Access control.
Computer networks.
IBM Tivoli identity manager.
Physical Description:
1 online resource (198 p.)
Edition:
1st ed.
Place of Publication:
Austin, TX : IBM, International Technical Support Organization, c2004.
Language Note:
English
Contents:
Front cover
Contents
Notices
Trademarks
Preface
The team that wrote this redbook
Become a published author
Comments welcome
Part 1 Why Integrated Identity Management
Chapter 1. An introduction to a new reference architecture
1.1 Everything is on demand today
1.2 Security management methods and practices
1.2.1 Confidentiality
1.2.2 Integrity
1.2.3 Availability
1.2.4 Areas of security implied in the CIA Triad
1.3 Business drivers
1.4 Issues affecting identity integration solutions
1.5 Integrated identity in the enterprise
1.5.1 Access control management
1.5.2 Identity and credential management
1.5.3 Audit management
1.5.4 Directory management
1.5.5 Privacy management
1.6 Conclusion
Chapter 2. What Bank International
2.1 Company profile
2.1.1 Geographic distribution of WBI
2.1.2 Organization of WBI
2.1.3 HR and personnel procedures
2.2 Current IT architecture
2.2.1 Overview of the WBI network
2.2.2 Recently implemented e-business initiative
2.2.3 Security infrastructure deployed for the e-business initiative
2.2.4 Secured e-business initiative architecture
2.2.5 Identity management and emerging problems
2.3 Corporate business vision and objectives
2.4 Business requirements
2.4.1 Business requirements for phase 1
2.4.2 Business requirements for phase 2
2.5 Functional requirements
2.5.1 Phase 1
2.5.2 Phase 2
2.6 Risk assessment
2.6.1 WBI risk assessment
2.7 Security design objectives
2.7.1 Functional design objectives
2.7.2 Non-functional design objectives
2.8 Architectural decisions
Chapter 3. Applying the reference architecture
3.1 Solution design and delivery approach
3.1.1 Implementation life-cycle
3.1.2 Requirements analysis
3.1.3 Incremental delivery strategy
3.2 WBI solution design.
3.2.1 Solution overview
3.2.2 Component model
3.2.3 The operational architecture
3.2.4 The security architecture
3.2.5 Implementation phases
Chapter 4. Implementing the solution
4.1 Development environment overview
4.1.1 Component model
4.1.2 Operational model
4.1.3 Security architecture
4.2 Technical implementation
4.2.1 Automatic provisioning
4.2.2 Application subscription
4.2.3 Self care
4.2.4 Self registration
4.3 Conclusion
Part 2 Appendixes
Appendix A. ISO 17799 compliance mapping
Corporate policy and standards
Standards, practices, and procedures
Practical example
External standards and certifications
Industry specific requirements
Product or solution certifications
Nationally and internationally recognized standards
Legal requirements
ISO 17799 and integrated identity management
Summary
Glossary
Related publications
IBM Redbooks
How to get IBM Redbooks
Help from IBM
Index
Back cover.
Notes:
"May 2004."
"SG24-6054-00."
Includes bibliographical references and index.
OCLC:
61397302

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account