Deployment guide series: IBM Tivoli Identity Manager 5.0
Deploying an identity management solution for a medium size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, their deployed infrastructure, and the application framework, we can define an applicable representation of th...
Gespeichert in:
Beteilige Person: | |
---|---|
Körperschaft: | |
Weitere beteiligte Personen: | , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[United States]
IBM
2008
|
Schriftenreihe: | IBM redbooks
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/0738432067/?ar |
Zusammenfassung: | Deploying an identity management solution for a medium size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, their deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an identity management implementation. This IBM® Redbooks® publication, intended for IBM Business Partners, takes a step-by-step approach to implementing an identity management solution based on IBM Tivoli® Identity Manager. Part 1 discusses the general business context and the planning approach for an identity management solution. Part 2 takes you through an example company profile with existing business policies and guidelines and builds an identity management solution design for this particular environment. We describe how the components can be integrated into the existing environment. Then, we focus on the detailed configuration of identity management integration tasks that must be implemented in order to create a fully functional end-to-end solution. This IBM Redbooks publication does not introduce any general identity management concepts, nor does it systematically explain all of Tivoli Identity Manager's components and capabilities; instead, those details are thoroughly discussed in the IBM Redbooks publications: Identity Management Design Guide with IBM Tivoli Identity Manager, SG24-6996, and Enterprise Security Architecture Using IBM Tivoli Security Solutions, SG24-6014. |
Beschreibung: | Title from resource description page. - Includes bibliographical references (pages 279-280) and index. - Print version record |
Umfang: | 1 Online-Ressource (xvi, 284 Seiten) illustrations |
ISBN: | 0738432067 9780738432069 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-051690195 | ||
003 | DE-627-1 | ||
005 | 20240228114345.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2008 xx |||||o 00| ||eng c | ||
020 | |a 0738432067 |9 0-7384-3206-7 | ||
020 | |a 9780738432069 |9 978-0-7384-3206-9 | ||
035 | |a (DE-627-1)051690195 | ||
035 | |a (DE-599)KEP051690195 | ||
035 | |a (ORHE)0738432067 | ||
035 | |a (DE-627-1)051690195 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 B922 Dep 2008 [ONLINE] | |
100 | 1 | |a Bücker, Axel |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Deployment guide series |b IBM Tivoli Identity Manager 5.0 |c Axel Buecker, Walter Karl, Jani Perttila |
246 | 3 | 3 | |a IBM Tivoli identity manager 5.0 |
264 | 1 | |a [United States] |b IBM |c 2008 | |
300 | |a 1 Online-Ressource (xvi, 284 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a IBM redbooks | |
500 | |a Title from resource description page. - Includes bibliographical references (pages 279-280) and index. - Print version record | ||
520 | |a Deploying an identity management solution for a medium size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, their deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an identity management implementation. This IBM® Redbooks® publication, intended for IBM Business Partners, takes a step-by-step approach to implementing an identity management solution based on IBM Tivoli® Identity Manager. Part 1 discusses the general business context and the planning approach for an identity management solution. Part 2 takes you through an example company profile with existing business policies and guidelines and builds an identity management solution design for this particular environment. We describe how the components can be integrated into the existing environment. Then, we focus on the detailed configuration of identity management integration tasks that must be implemented in order to create a fully functional end-to-end solution. This IBM Redbooks publication does not introduce any general identity management concepts, nor does it systematically explain all of Tivoli Identity Manager's components and capabilities; instead, those details are thoroughly discussed in the IBM Redbooks publications: Identity Management Design Guide with IBM Tivoli Identity Manager, SG24-6996, and Enterprise Security Architecture Using IBM Tivoli Security Solutions, SG24-6014. | ||
630 | 2 | 0 | |a IBM Tivoli identity manager |
650 | 0 | |a Electronic commerce |x Security measures | |
650 | 0 | |a Business |x Data processing |x Security measures | |
650 | 0 | |a Computer networks |x Access control | |
650 | 0 | |a Computer security | |
650 | 4 | |a IBM Tivoli identity manager | |
650 | 4 | |a IBM Tivoli identity manager | |
650 | 4 | |a Commerce électronique ; Sécurité ; Mesures | |
650 | 4 | |a Gestion ; Informatique ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Electronic commerce ; Security measures | |
650 | 4 | |a Business ; Data processing ; Security measures | |
650 | 4 | |a Computer networks ; Access control | |
650 | 4 | |a Computer security | |
650 | 4 | |a Business ; Data processing ; Security measures | |
650 | 4 | |a Computer networks ; Access control | |
650 | 4 | |a Computer security | |
650 | 4 | |a Electronic commerce ; Security measures | |
700 | 1 | |a Perttilä, Jani |e MitwirkendeR |4 ctb | |
700 | 1 | |a Karl, Walter |e MitwirkendeR |4 ctb | |
710 | 2 | |a International Business Machines Corporation. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0738432067/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-051690195 |
---|---|
_version_ | 1821494843207057408 |
adam_text | |
any_adam_object | |
author | Bücker, Axel |
author2 | Perttilä, Jani Karl, Walter |
author2_role | ctb ctb |
author2_variant | j p jp w k wk |
author_corporate | International Business Machines Corporation |
author_corporate_role | ctb |
author_facet | Bücker, Axel Perttilä, Jani Karl, Walter International Business Machines Corporation |
author_role | aut |
author_sort | Bücker, Axel |
author_variant | a b ab |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)051690195 (DE-599)KEP051690195 (ORHE)0738432067 |
dewey-full | 005.8B922DEP2008[ONLINE] |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 B922 Dep 2008 [ONLINE] |
dewey-search | 005.8 B922 Dep 2008 [ONLINE] |
dewey-sort | 15.8 B922 DEP 42008 ONLINE |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03954cam a22006252 4500</leader><controlfield tag="001">ZDB-30-ORH-051690195</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114345.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2008 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738432067</subfield><subfield code="9">0-7384-3206-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738432069</subfield><subfield code="9">978-0-7384-3206-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051690195</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051690195</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0738432067</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051690195</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8 B922 Dep 2008 [ONLINE]</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bücker, Axel</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Deployment guide series</subfield><subfield code="b">IBM Tivoli Identity Manager 5.0</subfield><subfield code="c">Axel Buecker, Walter Karl, Jani Perttila</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">IBM Tivoli identity manager 5.0</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[United States]</subfield><subfield code="b">IBM</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 284 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IBM redbooks</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from resource description page. - Includes bibliographical references (pages 279-280) and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Deploying an identity management solution for a medium size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, their deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an identity management implementation. This IBM® Redbooks® publication, intended for IBM Business Partners, takes a step-by-step approach to implementing an identity management solution based on IBM Tivoli® Identity Manager. Part 1 discusses the general business context and the planning approach for an identity management solution. Part 2 takes you through an example company profile with existing business policies and guidelines and builds an identity management solution design for this particular environment. We describe how the components can be integrated into the existing environment. Then, we focus on the detailed configuration of identity management integration tasks that must be implemented in order to create a fully functional end-to-end solution. This IBM Redbooks publication does not introduce any general identity management concepts, nor does it systematically explain all of Tivoli Identity Manager's components and capabilities; instead, those details are thoroughly discussed in the IBM Redbooks publications: Identity Management Design Guide with IBM Tivoli Identity Manager, SG24-6996, and Enterprise Security Architecture Using IBM Tivoli Security Solutions, SG24-6014.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">IBM Tivoli identity manager</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IBM Tivoli identity manager</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IBM Tivoli identity manager</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Commerce électronique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion ; Informatique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business ; Data processing ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business ; Data processing ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Perttilä, Jani</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Karl, Walter</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Business Machines Corporation.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0738432067/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-051690195 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:49Z |
institution | BVB |
isbn | 0738432067 9780738432069 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xvi, 284 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | IBM |
record_format | marc |
series2 | IBM redbooks |
spelling | Bücker, Axel VerfasserIn aut Deployment guide series IBM Tivoli Identity Manager 5.0 Axel Buecker, Walter Karl, Jani Perttila IBM Tivoli identity manager 5.0 [United States] IBM 2008 1 Online-Ressource (xvi, 284 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier IBM redbooks Title from resource description page. - Includes bibliographical references (pages 279-280) and index. - Print version record Deploying an identity management solution for a medium size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, their deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an identity management implementation. This IBM® Redbooks® publication, intended for IBM Business Partners, takes a step-by-step approach to implementing an identity management solution based on IBM Tivoli® Identity Manager. Part 1 discusses the general business context and the planning approach for an identity management solution. Part 2 takes you through an example company profile with existing business policies and guidelines and builds an identity management solution design for this particular environment. We describe how the components can be integrated into the existing environment. Then, we focus on the detailed configuration of identity management integration tasks that must be implemented in order to create a fully functional end-to-end solution. This IBM Redbooks publication does not introduce any general identity management concepts, nor does it systematically explain all of Tivoli Identity Manager's components and capabilities; instead, those details are thoroughly discussed in the IBM Redbooks publications: Identity Management Design Guide with IBM Tivoli Identity Manager, SG24-6996, and Enterprise Security Architecture Using IBM Tivoli Security Solutions, SG24-6014. IBM Tivoli identity manager Electronic commerce Security measures Business Data processing Security measures Computer networks Access control Computer security Commerce électronique ; Sécurité ; Mesures Gestion ; Informatique ; Sécurité ; Mesures Sécurité informatique Electronic commerce ; Security measures Business ; Data processing ; Security measures Computer networks ; Access control Perttilä, Jani MitwirkendeR ctb Karl, Walter MitwirkendeR ctb International Business Machines Corporation. MitwirkendeR ctb |
spellingShingle | Bücker, Axel Deployment guide series IBM Tivoli Identity Manager 5.0 IBM Tivoli identity manager Electronic commerce Security measures Business Data processing Security measures Computer networks Access control Computer security Commerce électronique ; Sécurité ; Mesures Gestion ; Informatique ; Sécurité ; Mesures Sécurité informatique Electronic commerce ; Security measures Business ; Data processing ; Security measures Computer networks ; Access control |
title | Deployment guide series IBM Tivoli Identity Manager 5.0 |
title_alt | IBM Tivoli identity manager 5.0 |
title_auth | Deployment guide series IBM Tivoli Identity Manager 5.0 |
title_exact_search | Deployment guide series IBM Tivoli Identity Manager 5.0 |
title_full | Deployment guide series IBM Tivoli Identity Manager 5.0 Axel Buecker, Walter Karl, Jani Perttila |
title_fullStr | Deployment guide series IBM Tivoli Identity Manager 5.0 Axel Buecker, Walter Karl, Jani Perttila |
title_full_unstemmed | Deployment guide series IBM Tivoli Identity Manager 5.0 Axel Buecker, Walter Karl, Jani Perttila |
title_short | Deployment guide series |
title_sort | deployment guide series ibm tivoli identity manager 5 0 |
title_sub | IBM Tivoli Identity Manager 5.0 |
topic | IBM Tivoli identity manager Electronic commerce Security measures Business Data processing Security measures Computer networks Access control Computer security Commerce électronique ; Sécurité ; Mesures Gestion ; Informatique ; Sécurité ; Mesures Sécurité informatique Electronic commerce ; Security measures Business ; Data processing ; Security measures Computer networks ; Access control |
topic_facet | IBM Tivoli identity manager Electronic commerce Security measures Business Data processing Security measures Computer networks Access control Computer security Commerce électronique ; Sécurité ; Mesures Gestion ; Informatique ; Sécurité ; Mesures Sécurité informatique Electronic commerce ; Security measures Business ; Data processing ; Security measures Computer networks ; Access control |
work_keys_str_mv | AT buckeraxel deploymentguideseriesibmtivoliidentitymanager50 AT perttilajani deploymentguideseriesibmtivoliidentitymanager50 AT karlwalter deploymentguideseriesibmtivoliidentitymanager50 AT internationalbusinessmachinescorporation deploymentguideseriesibmtivoliidentitymanager50 AT buckeraxel ibmtivoliidentitymanager50 AT perttilajani ibmtivoliidentitymanager50 AT karlwalter ibmtivoliidentitymanager50 AT internationalbusinessmachinescorporation ibmtivoliidentitymanager50 |