Enterprise business portals II with IBM tivoli access manager:
Mastering IBM Tivoli Access Manager is a very important factor in successfully deploying contemporary e-business solutions. Access Manager is the key element in an e-business security framework that needs thorough understanding to achieve maximum security, functionality, and performance. Based on ex...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | , , , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
San Jose, CA
IBM
2003
|
Schriftenreihe: | IBM redbooks
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/0738428078/?ar |
Zusammenfassung: | Mastering IBM Tivoli Access Manager is a very important factor in successfully deploying contemporary e-business solutions. Access Manager is the key element in an e-business security framework that needs thorough understanding to achieve maximum security, functionality, and performance. Based on expandable security policies for users, groups, and protected resources, Tivoli Access Manager manages authentication and authorization for application servers, Web sites, and virtually any other resource that requires protection, including custom-written applications. This IBM Redbooks publication describes how to build an integrated enterprise business portal with Tivoli Access Manager Version 4.1, WebSphere Portal, mySAP Workplace, and the SAP Enterprise Portal. It also describes how to implement a federated single sign-on solution within a Web Services scenario. This book is partitioned into general and customer scenario based sections. This book is a valuable resource for security administrators and architects who wish to understand and implement a centralized security infrastructure. Please note that the additional material referenced in the text is not available from IBM. |
Beschreibung: | Includes bibliographical references (pages 459-461) and index. - Print version record |
Umfang: | 1 Online-Ressource (xxii, 468 Seiten) illustrations |
ISBN: | 0738428078 9780738428079 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-051691205 | ||
003 | DE-627-1 | ||
005 | 20240228114051.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2003 xx |||||o 00| ||eng c | ||
020 | |a 0738428078 |9 0-7384-2807-8 | ||
020 | |a 9780738428079 |9 978-0-7384-2807-9 | ||
035 | |a (DE-627-1)051691205 | ||
035 | |a (DE-599)KEP051691205 | ||
035 | |a (ORHE)0738428078 | ||
035 | |a (DE-627-1)051691205 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 658.4/72 |2 22 | |
100 | 1 | |a Bücker, Axel |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Enterprise business portals II with IBM tivoli access manager |c Axel Bucker et al |
264 | 1 | |a San Jose, CA |b IBM |c 2003 | |
300 | |a 1 Online-Ressource (xxii, 468 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a IBM redbooks | |
500 | |a Includes bibliographical references (pages 459-461) and index. - Print version record | ||
520 | |a Mastering IBM Tivoli Access Manager is a very important factor in successfully deploying contemporary e-business solutions. Access Manager is the key element in an e-business security framework that needs thorough understanding to achieve maximum security, functionality, and performance. Based on expandable security policies for users, groups, and protected resources, Tivoli Access Manager manages authentication and authorization for application servers, Web sites, and virtually any other resource that requires protection, including custom-written applications. This IBM Redbooks publication describes how to build an integrated enterprise business portal with Tivoli Access Manager Version 4.1, WebSphere Portal, mySAP Workplace, and the SAP Enterprise Portal. It also describes how to implement a federated single sign-on solution within a Web Services scenario. This book is partitioned into general and customer scenario based sections. This book is a valuable resource for security administrators and architects who wish to understand and implement a centralized security infrastructure. Please note that the additional material referenced in the text is not available from IBM. | ||
546 | |a English. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Web portals |x Security measures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Portails (Informatique) ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures | |
700 | 1 | |a Antonius, Jesper |e MitwirkendeR |4 ctb | |
700 | 1 | |a Riexinger, Dieter |e MitwirkendeR |4 ctb | |
700 | 1 | |a Sommer, Frank |e MitwirkendeR |4 ctb | |
700 | 1 | |a Sumida, Atsushi |e MitwirkendeR |4 ctb | |
776 | 1 | |z 0738428078 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0738428078 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0738428078/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-051691205 |
---|---|
_version_ | 1821494843034042368 |
adam_text | |
any_adam_object | |
author | Bücker, Axel |
author2 | Antonius, Jesper Riexinger, Dieter Sommer, Frank Sumida, Atsushi |
author2_role | ctb ctb ctb ctb |
author2_variant | j a ja d r dr f s fs a s as |
author_facet | Bücker, Axel Antonius, Jesper Riexinger, Dieter Sommer, Frank Sumida, Atsushi |
author_role | aut |
author_sort | Bücker, Axel |
author_variant | a b ab |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)051691205 (DE-599)KEP051691205 (ORHE)0738428078 |
dewey-full | 658.4/72 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/72 |
dewey-search | 658.4/72 |
dewey-sort | 3658.4 272 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03012cam a22005052 4500</leader><controlfield tag="001">ZDB-30-ORH-051691205</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114051.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2003 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738428078</subfield><subfield code="9">0-7384-2807-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738428079</subfield><subfield code="9">978-0-7384-2807-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051691205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051691205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0738428078</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051691205</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/72</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bücker, Axel</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Enterprise business portals II with IBM tivoli access manager</subfield><subfield code="c">Axel Bucker et al</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Jose, CA</subfield><subfield code="b">IBM</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 468 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IBM redbooks</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 459-461) and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Mastering IBM Tivoli Access Manager is a very important factor in successfully deploying contemporary e-business solutions. Access Manager is the key element in an e-business security framework that needs thorough understanding to achieve maximum security, functionality, and performance. Based on expandable security policies for users, groups, and protected resources, Tivoli Access Manager manages authentication and authorization for application servers, Web sites, and virtually any other resource that requires protection, including custom-written applications. This IBM Redbooks publication describes how to build an integrated enterprise business portal with Tivoli Access Manager Version 4.1, WebSphere Portal, mySAP Workplace, and the SAP Enterprise Portal. It also describes how to implement a federated single sign-on solution within a Web Services scenario. This book is partitioned into general and customer scenario based sections. This book is a valuable resource for security administrators and architects who wish to understand and implement a centralized security infrastructure. Please note that the additional material referenced in the text is not available from IBM.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web portals</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Portails (Informatique) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Antonius, Jesper</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Riexinger, Dieter</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sommer, Frank</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sumida, Atsushi</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">0738428078</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0738428078</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0738428078/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-051691205 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:49Z |
institution | BVB |
isbn | 0738428078 9780738428079 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxii, 468 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | IBM |
record_format | marc |
series2 | IBM redbooks |
spelling | Bücker, Axel VerfasserIn aut Enterprise business portals II with IBM tivoli access manager Axel Bucker et al San Jose, CA IBM 2003 1 Online-Ressource (xxii, 468 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier IBM redbooks Includes bibliographical references (pages 459-461) and index. - Print version record Mastering IBM Tivoli Access Manager is a very important factor in successfully deploying contemporary e-business solutions. Access Manager is the key element in an e-business security framework that needs thorough understanding to achieve maximum security, functionality, and performance. Based on expandable security policies for users, groups, and protected resources, Tivoli Access Manager manages authentication and authorization for application servers, Web sites, and virtually any other resource that requires protection, including custom-written applications. This IBM Redbooks publication describes how to build an integrated enterprise business portal with Tivoli Access Manager Version 4.1, WebSphere Portal, mySAP Workplace, and the SAP Enterprise Portal. It also describes how to implement a federated single sign-on solution within a Web Services scenario. This book is partitioned into general and customer scenario based sections. This book is a valuable resource for security administrators and architects who wish to understand and implement a centralized security infrastructure. Please note that the additional material referenced in the text is not available from IBM. English. Computer networks Security measures Web portals Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Portails (Informatique) ; Sécurité ; Mesures Computer networks ; Security measures Antonius, Jesper MitwirkendeR ctb Riexinger, Dieter MitwirkendeR ctb Sommer, Frank MitwirkendeR ctb Sumida, Atsushi MitwirkendeR ctb 0738428078 Erscheint auch als Druck-Ausgabe 0738428078 |
spellingShingle | Bücker, Axel Enterprise business portals II with IBM tivoli access manager Computer networks Security measures Web portals Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Portails (Informatique) ; Sécurité ; Mesures Computer networks ; Security measures |
title | Enterprise business portals II with IBM tivoli access manager |
title_auth | Enterprise business portals II with IBM tivoli access manager |
title_exact_search | Enterprise business portals II with IBM tivoli access manager |
title_full | Enterprise business portals II with IBM tivoli access manager Axel Bucker et al |
title_fullStr | Enterprise business portals II with IBM tivoli access manager Axel Bucker et al |
title_full_unstemmed | Enterprise business portals II with IBM tivoli access manager Axel Bucker et al |
title_short | Enterprise business portals II with IBM tivoli access manager |
title_sort | enterprise business portals ii with ibm tivoli access manager |
topic | Computer networks Security measures Web portals Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Portails (Informatique) ; Sécurité ; Mesures Computer networks ; Security measures |
topic_facet | Computer networks Security measures Web portals Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Portails (Informatique) ; Sécurité ; Mesures Computer networks ; Security measures |
work_keys_str_mv | AT buckeraxel enterprisebusinessportalsiiwithibmtivoliaccessmanager AT antoniusjesper enterprisebusinessportalsiiwithibmtivoliaccessmanager AT riexingerdieter enterprisebusinessportalsiiwithibmtivoliaccessmanager AT sommerfrank enterprisebusinessportalsiiwithibmtivoliaccessmanager AT sumidaatsushi enterprisebusinessportalsiiwithibmtivoliaccessmanager |