Integrating IBM security and SAP solutions:
Many large and medium-sized organizations have made strategic investments in the SAP NetWeaver technology platform as their primary application platform. In fact, SAP software is used to manage many core business processes and data. As a result, it is critical for all organizations to manage the lif...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Poughkeepsie, NY?]
IBM Corporation, International Technical Support Organization
2012
|
Schriftenreihe: | IBM redbooks
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/0738436569/?ar |
Zusammenfassung: | Many large and medium-sized organizations have made strategic investments in the SAP NetWeaver technology platform as their primary application platform. In fact, SAP software is used to manage many core business processes and data. As a result, it is critical for all organizations to manage the life cycle of user access to the SAP applications while adhering to security and risk compliance requirements. In this IBM℗ʼ Redbooks℗ʼ publication, we discuss the integration points into SAP solutions that are supported by the IBM Security access and identity management product capabilities. IBM Security software offers a range of identity management (IdM) adapters and access management components for SAP solutions that are available with IBM Tivoli℗ʼ Identity Manager, IBM Tivoli Directory Integrator, IBM Tivoli Directory Server, IBM Access Manager for e-business, IBM Tivoli Access Manager for Enterprise Single Sign-On, and IBM Tivoli Federated Identity Manager. This book is a valuable resource for security officers, consultants, administrators, and architects who want to understand and implement an identity management solution for an SAP environment. |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 Online-Ressource (xviii, 410 Seiten) illustrations. |
ISBN: | 0738436569 9780738436562 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-092522432 | ||
003 | DE-627-1 | ||
005 | 20240228115021.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230503s2012 xx |||||o 00| ||eng c | ||
020 | |a 0738436569 |9 0-7384-3656-9 | ||
020 | |a 9780738436562 |9 978-0-7384-3656-2 | ||
035 | |a (DE-627-1)092522432 | ||
035 | |a (DE-599)KEP092522432 | ||
035 | |a (ORHE)0738436569 | ||
035 | |a (DE-627-1)092522432 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Integrating IBM security and SAP solutions |c Axel Buecker [and others] |
264 | 1 | |a [Poughkeepsie, NY?] |b IBM Corporation, International Technical Support Organization |c 2012 | |
300 | |a 1 Online-Ressource (xviii, 410 Seiten) |b illustrations. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a IBM redbooks | |
500 | |a Includes bibliographical references and index | ||
520 | |a Many large and medium-sized organizations have made strategic investments in the SAP NetWeaver technology platform as their primary application platform. In fact, SAP software is used to manage many core business processes and data. As a result, it is critical for all organizations to manage the life cycle of user access to the SAP applications while adhering to security and risk compliance requirements. In this IBM℗ʼ Redbooks℗ʼ publication, we discuss the integration points into SAP solutions that are supported by the IBM Security access and identity management product capabilities. IBM Security software offers a range of identity management (IdM) adapters and access management components for SAP solutions that are available with IBM Tivoli℗ʼ Identity Manager, IBM Tivoli Directory Integrator, IBM Tivoli Directory Server, IBM Access Manager for e-business, IBM Tivoli Access Manager for Enterprise Single Sign-On, and IBM Tivoli Federated Identity Manager. This book is a valuable resource for security officers, consultants, administrators, and architects who want to understand and implement an identity management solution for an SAP environment. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Business |x Data processing |x Security measures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Gestion ; Informatique ; Sécurité ; Mesures | |
650 | 4 | |a Business ; Data processing ; Security measures | |
650 | 4 | |a Computer networks ; Security measures | |
700 | 1 | |a Bücker, Axel |e MitwirkendeR |4 ctb | |
710 | 2 | |a International Business Machines Corporation. |b International Technical Support Organization. |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9780738436562 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780738436562 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0738436569/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-092522432 |
---|---|
_version_ | 1821494813777723392 |
adam_text | |
any_adam_object | |
author2 | Bücker, Axel |
author2_role | ctb |
author2_variant | a b ab |
author_corporate | International Business Machines Corporation. International Technical Support Organization |
author_corporate_role | ctb |
author_facet | Bücker, Axel International Business Machines Corporation. International Technical Support Organization |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)092522432 (DE-599)KEP092522432 (ORHE)0738436569 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02986cam a22004692 4500</leader><controlfield tag="001">ZDB-30-ORH-092522432</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115021.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230503s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738436569</subfield><subfield code="9">0-7384-3656-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738436562</subfield><subfield code="9">978-0-7384-3656-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092522432</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP092522432</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0738436569</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092522432</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Integrating IBM security and SAP solutions</subfield><subfield code="c">Axel Buecker [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Poughkeepsie, NY?]</subfield><subfield code="b">IBM Corporation, International Technical Support Organization</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xviii, 410 Seiten)</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IBM redbooks</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Many large and medium-sized organizations have made strategic investments in the SAP NetWeaver technology platform as their primary application platform. In fact, SAP software is used to manage many core business processes and data. As a result, it is critical for all organizations to manage the life cycle of user access to the SAP applications while adhering to security and risk compliance requirements. In this IBM℗ʼ Redbooks℗ʼ publication, we discuss the integration points into SAP solutions that are supported by the IBM Security access and identity management product capabilities. IBM Security software offers a range of identity management (IdM) adapters and access management components for SAP solutions that are available with IBM Tivoli℗ʼ Identity Manager, IBM Tivoli Directory Integrator, IBM Tivoli Directory Server, IBM Access Manager for e-business, IBM Tivoli Access Manager for Enterprise Single Sign-On, and IBM Tivoli Federated Identity Manager. This book is a valuable resource for security officers, consultants, administrators, and architects who want to understand and implement an identity management solution for an SAP environment.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion ; Informatique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business ; Data processing ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bücker, Axel</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Business Machines Corporation.</subfield><subfield code="b">International Technical Support Organization.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780738436562</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780738436562</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0738436569/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-092522432 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:21Z |
institution | BVB |
isbn | 0738436569 9780738436562 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xviii, 410 Seiten) illustrations. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | IBM Corporation, International Technical Support Organization |
record_format | marc |
series2 | IBM redbooks |
spelling | Integrating IBM security and SAP solutions Axel Buecker [and others] [Poughkeepsie, NY?] IBM Corporation, International Technical Support Organization 2012 1 Online-Ressource (xviii, 410 Seiten) illustrations. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier IBM redbooks Includes bibliographical references and index Many large and medium-sized organizations have made strategic investments in the SAP NetWeaver technology platform as their primary application platform. In fact, SAP software is used to manage many core business processes and data. As a result, it is critical for all organizations to manage the life cycle of user access to the SAP applications while adhering to security and risk compliance requirements. In this IBM℗ʼ Redbooks℗ʼ publication, we discuss the integration points into SAP solutions that are supported by the IBM Security access and identity management product capabilities. IBM Security software offers a range of identity management (IdM) adapters and access management components for SAP solutions that are available with IBM Tivoli℗ʼ Identity Manager, IBM Tivoli Directory Integrator, IBM Tivoli Directory Server, IBM Access Manager for e-business, IBM Tivoli Access Manager for Enterprise Single Sign-On, and IBM Tivoli Federated Identity Manager. This book is a valuable resource for security officers, consultants, administrators, and architects who want to understand and implement an identity management solution for an SAP environment. Computer networks Security measures Business Data processing Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Gestion ; Informatique ; Sécurité ; Mesures Business ; Data processing ; Security measures Computer networks ; Security measures Bücker, Axel MitwirkendeR ctb International Business Machines Corporation. International Technical Support Organization. MitwirkendeR ctb 9780738436562 Erscheint auch als Druck-Ausgabe 9780738436562 |
spellingShingle | Integrating IBM security and SAP solutions Computer networks Security measures Business Data processing Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Gestion ; Informatique ; Sécurité ; Mesures Business ; Data processing ; Security measures Computer networks ; Security measures |
title | Integrating IBM security and SAP solutions |
title_auth | Integrating IBM security and SAP solutions |
title_exact_search | Integrating IBM security and SAP solutions |
title_full | Integrating IBM security and SAP solutions Axel Buecker [and others] |
title_fullStr | Integrating IBM security and SAP solutions Axel Buecker [and others] |
title_full_unstemmed | Integrating IBM security and SAP solutions Axel Buecker [and others] |
title_short | Integrating IBM security and SAP solutions |
title_sort | integrating ibm security and sap solutions |
topic | Computer networks Security measures Business Data processing Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Gestion ; Informatique ; Sécurité ; Mesures Business ; Data processing ; Security measures Computer networks ; Security measures |
topic_facet | Computer networks Security measures Business Data processing Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Gestion ; Informatique ; Sécurité ; Mesures Business ; Data processing ; Security measures Computer networks ; Security measures |
work_keys_str_mv | AT buckeraxel integratingibmsecurityandsapsolutions AT internationalbusinessmachinescorporationinternationaltechnicalsupportorganization integratingibmsecurityandsapsolutions |