|
|
|
|
LEADER |
00000cam a22000007i 4500 |
001 |
OR_on1351504430 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
221122s2011 xxua o 001 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d UMI
|d COO
|d DEBSZ
|d OCLCF
|d CEF
|d WYU
|d OCLCQ
|d TOH
|d OCLCO
|
019 |
|
|
|a 773222905
|a 1065103724
|
020 |
|
|
|z 9780738436067
|
020 |
|
|
|a 0738436062
|
020 |
|
|
|a 9780738436067
|
029 |
1 |
|
|a DEBSZ
|b 370592514
|
029 |
1 |
|
|a GBVCP
|b 785435743
|
029 |
1 |
|
|a AU@
|b 000057228969
|
035 |
|
|
|a (OCoLC)1351504430
|z (OCoLC)773222905
|z (OCoLC)1065103724
|
037 |
|
|
|a 0738436062
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.D3
|
082 |
0 |
4 |
|a 005.75/65
|2 23/eng/20221122
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Singh, Karan
|c (Systems programmer),
|e author.
|
245 |
1 |
0 |
|a Z/Os Identity Propagation /
|c Karan Singh [and 8 others].
|
264 |
|
1 |
|a [United States] :
|b IBM, International Technical Support Organization,
|c 2011.
|
300 |
|
|
|a 1 online resource (182 pages) :
|b illustration.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a IBM redbooks
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a This IBM℗ʼ Redbooks℗ʼ publication explores various implementations of z/OS℗ʼ Identity Propagation where the distributed identity of an end user is passed to z/OS and used to map to a RACF℗ʼ user ID, and any related events in the audit trail from RACF show both RACF and distributed identities. This book describes the concept of identity propagation and how it can address the end-to end accountability issue of many customers. It describes, at a high level, what identity propagation is, and why it is important to us. It shows a conceptual view of the key elements necessary to accomplish this. This book provides details on the RACMAP function, filter management and how to use the SMF records to provide an audit trail. In depth coverage is provided about the internal implementation of identity propagation, such as providing information about available callable services. This book examines the current exploiters of z/OS Identity Propagation and provide several detailed examples covering CICS℗ʼ with CICS Transaction Gateway, DB2℗ʼ, and CICS Web services with Datapower.
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references (page 161) and index.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
7 |
|a Z/OS.
|2 blmlsh
|
630 |
0 |
7 |
|a z/OS
|2 fast
|
650 |
|
0 |
|a Database management.
|
650 |
|
0 |
|a Database security.
|
650 |
|
6 |
|a Bases de données
|x Gestion.
|
650 |
|
6 |
|a Bases de données
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Systèmes d'exploitation (Ordinateurs)
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Database management
|2 fast
|
650 |
|
7 |
|a Database security
|2 fast
|
650 |
|
7 |
|a Operating systems (Computers)
|x Security measures
|2 fast
|
655 |
|
0 |
|a Electronic book.
|
776 |
0 |
8 |
|i Print version:
|t Z/Os Identity Propagation.
|d [United States] : IBM, International Technical Support Organization, 2011
|z 9780738436067
|w (DLC) 2013376602
|w (OCoLC)1022982481
|
830 |
|
0 |
|a IBM redbooks.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0738436062/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|