Skip to main content

Enterprise Security Architecture Using IBM Tivoli Security Solutions

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 07 August 2007

  1. .EPUB (10.7 MB)
  2. .PDF (19.3 MB)

Google Play BooksRead in Google Books Order hardcopy
Share this page:   

ISBN-10: 0738486418
ISBN-13: 9780738486413
IBM Form #: SG24-6014-04


Authors: Axel Buecker, Ana Veronica Carreno, Norman Field, Christopher Hockings, Daniel Kawer, Sujit Mohanty and Guilherme Monteiro

menu icon

Abstract

This IBM Redbooks publication reviews the overall Tivoli Enterprise Security Architecture. It focuses on the integration of audit and compliance, access control, identity management, and federation throughout extensive e-business enterprise implementations. The available security product diversity in the marketplace challenges everyone in charge of designing single secure solutions or an overall enterprise security architecture. With Access Manager, Identity Manager, Federated Identity Manager, Security Compliance Manager, Security Operations Manager, Directory Server, and Directory Integrator, Tivoli offers a complete set of products designed to address these challenges.

This book describes the major logical and physical components of each of the Tivoli products. It also depicts several e-business scenarios with different security challenges and requirements. By matching the desired Tivoli security product criteria, this publication describes the appropriate security implementations that meet the targeted requirements.

This book is a valuable resource for security officers, administrators, and architects who want to understand and implement enterprise security following architectural guidelines.

Table of Contents

Part 1. Terminology and infrastructure

Chapter 1. Business context

Chapter 2. Common security architecture and network models

Chapter 3. Directory technologies

Chapter 4. Single sign-on technologies

Part 2. Managing access control

Chapter 5. Access Manager core components

Chapter 6. Access Manager for e-business

Chapter 7. A basic WebSEAL scenario

Chapter 8. Increasing availability and scalability

Chapter 9. Authentication and single sign-on with Access Manager for e-business

Chapter 10. Access Manager authorization

Chapter 11. Application integration

Chapter 12. Access Manager for Operating Systems

Chapter 13. Access Manager for Operating Systems business scenario

Chapter 14. Access Manager for Business Integration

Chapter 15. Access Manager for Enterprise Single Sign-On

Chapter 16. Tivoli Access Manager for Enterprise Single Sign-On scenario

Part 3. Managing identities and credentials

Chapter 17. Identity management

Chapter 18. Identity Manager structure and components

Chapter 19. Identity Manager scenarios

Chapter 20. Identity Manager Express structure and components

Chapter 21. Synchronizing the enterprise

Part 4. Managing federations

Chapter 22. Business context for identity federation

Chapter 23. Federation concepts

Chapter 24. Federated Identity Manager

Chapter 25. Cross enterprise federated single sign-on scenario

Chapter 26. Tivoli Federated Identity Manager patterns

Part 5. Managing security audit and compliance

Chapter 27. Introducing IBM Tivoli Common Auditing and Reporting Service

Chapter 28. Security Operations Manager topology and infrastructure

Chapter 29. Building a security information event management system

Chapter 30. Compliance management with Tivoli Security Compliance Manager

Chapter 31. Tivoli Security Compliance Manager scenarios

Appendix A. Method for Architecting Secure Solutions

Appendix B. Productivity and functional enhancements

 

Others who read this also read