Skip to main content

Integrating IBM Security and SAP Solutions

An IBM Redbooks publication

thumbnail 

Published on 23 February 2012, updated 19 March 2012

  1. .EPUB (4.1 MB)
  2. .PDF (9.8 MB)

Apple BooksGoogle Play BooksRead in Google Books Order hardcopy
Share this page:   

ISBN-10: 0738436569
ISBN-13: 9780738436562
IBM Form #: SG24-8015-00


Authors: Axel Buecker, Ivy Chiu, Kenny Chow, Ingo Dressler, Anthony Ferguson, Vaughan Harper, David Moore, Zoran Radenkovic, Guy Redding, John Robinson, Sascha Schefenacker and Franz Wolfhagen

    menu icon

    Abstract

    Many large and medium-sized organizations have made strategic investments in the SAP NetWeaver technology platform as their primary application platform. In fact, SAP software is used to manage many core business processes and data. As a result, it is critical for all organizations to manage the life cycle of user access to the SAP applications while adhering to security and risk compliance requirements.

    In this IBM® Redbooks® publication, we discuss the integration points into SAP solutions that are supported by the IBM Security access and identity management product capabilities. IBM Security software offers a range of identity management (IdM) adapters and access management components for SAP solutions that are available with IBM Tivoli® Identity Manager, IBM Tivoli Directory Integrator, IBM Tivoli Directory Server, IBM Access Manager for e-business, IBM Tivoli Access Manager for Enterprise Single Sign-On, and IBM Tivoli Federated Identity Manager.

    This book is a valuable resource for security officers, consultants, administrators, and architects who want to understand and implement an identity management solution for an SAP environment.

    Table of Contents

    Part 1. Business context and SAP solution overview

    Chapter 1. Business context for SAP security integration

    Chapter 2. Introduction to SAP solutions and security technology

    Part 2. Identity management integration

    Chapter 3. IBM Security identity management offerings

    Chapter 4. IBM Tivoli Identity Manager

    Chapter 5. IBM Tivoli Directory Integrator

    Chapter 6. IBM Tivoli Directory Server

    Chapter 7. Identity management use cases

    Part 3. Access management integration

    Chapter 8. IBM Security access management offerings

    Chapter 9. IBM Tivoli Access Manager for Enterprise Single Sign-on

    Chapter 10. IBM Tivoli Access Manager for e-business

    Chapter 11. IBM Tivoli Federated Identity Manager

    Chapter 12. Access management use cases

    Appendix A. IBM Security systems integrations: Beyond identity and access management

     

    Others who read this also read