Cargando…

Deployment guide series. IBM Tivoli Identity Manager 5.0 /

Deploying an identity management solution for a medium size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, their deployed infrastructure, and the application framework, we can define an applicable representation of th...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Bücker, Axel
Autor Corporativo: International Business Machines Corporation
Otros Autores: Perttilä, Jani, Karl, Walter
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [United States] : IBM, 2008.
Colección:IBM redbooks.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn313669099
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 090310s2008 xxua ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d OCLCQ  |d CEF  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d OCLCO  |d CNNAI  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d REB  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCA  |d OCLCQ  |d TOH  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1044202951  |a 1056389923  |a 1074321763  |a 1100908685  |a 1103566454 
020 |a 0738432067 
020 |a 9780738432069 
029 1 |a AU@  |b 000057224793 
029 1 |a AU@  |b 000067075449 
029 1 |a CHBIS  |b 006152158 
029 1 |a CHVBK  |b 171487737 
029 1 |a DEBSZ  |b 355376792 
035 |a (OCoLC)313669099  |z (OCoLC)1044202951  |z (OCoLC)1056389923  |z (OCoLC)1074321763  |z (OCoLC)1100908685  |z (OCoLC)1103566454 
037 |a CL0500000035  |b Safari Books Online 
050 4 |a HF5548.32  |b .B813 2008 
082 0 4 |a 005.8 B922 Dep 2008 [ONLINE] 
049 |a UAMI 
100 1 |a Bücker, Axel. 
245 1 0 |a Deployment guide series.  |p IBM Tivoli Identity Manager 5.0 /  |c Axel Buecker, Walter Karl, Jani Perttila. 
246 3 0 |a IBM Tivoli identity manager 5.0 
260 |a [United States] :  |b IBM,  |c 2008. 
300 |a 1 online resource (xvi, 284 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a IBM redbooks 
500 |a Title from resource description page. 
504 |a Includes bibliographical references (pages 279-280) and index. 
588 0 |a Print version record. 
520 |a Deploying an identity management solution for a medium size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, their deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an identity management implementation. This IBM® Redbooks® publication, intended for IBM Business Partners, takes a step-by-step approach to implementing an identity management solution based on IBM Tivoli® Identity Manager. Part 1 discusses the general business context and the planning approach for an identity management solution. Part 2 takes you through an example company profile with existing business policies and guidelines and builds an identity management solution design for this particular environment. We describe how the components can be integrated into the existing environment. Then, we focus on the detailed configuration of identity management integration tasks that must be implemented in order to create a fully functional end-to-end solution. This IBM Redbooks publication does not introduce any general identity management concepts, nor does it systematically explain all of Tivoli Identity Manager's components and capabilities; instead, those details are thoroughly discussed in the IBM Redbooks publications: Identity Management Design Guide with IBM Tivoli Identity Manager, SG24-6996, and Enterprise Security Architecture Using IBM Tivoli Security Solutions, SG24-6014. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a IBM Tivoli identity manager. 
630 0 7 |a IBM Tivoli identity manager.  |2 blmlsh 
630 0 7 |a IBM Tivoli identity manager  |2 fast 
650 0 |a Electronic commerce  |x Security measures. 
650 0 |a Business  |x Data processing  |x Security measures. 
650 0 |a Computer networks  |x Access control. 
650 0 |a Computer security. 
650 6 |a Commerce électronique  |x Sécurité  |x Mesures. 
650 6 |a Gestion  |x Informatique  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Electronic commerce  |x Security measures.  |2 blmlsh 
650 7 |a Business  |x Data processing  |x Security measures.  |2 blmlsh 
650 7 |a Computer networks  |x Access control.  |2 blmlsh 
650 7 |a Computer security.  |2 blmlsh 
650 7 |a Business  |x Data processing  |x Security measures  |2 fast 
650 7 |a Computer networks  |x Access control  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Electronic commerce  |x Security measures  |2 fast 
700 1 |a Perttilä, Jani. 
700 1 |a Karl, Walter. 
710 2 |a International Business Machines Corporation. 
830 0 |a IBM redbooks. 
856 4 0 |u https://learning.oreilly.com/library/view/~/0738432067/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP