8 Certification Study Guide: IBM Tivoli Access Manager for e-business 6.0
1.2.3 Test 876 objectives
Let us take a closer look at the five objective areas for this test:
򐂰 Planning
򐂰 Installation
򐂰 Configuration and customization
򐂰 Programming
򐂰 Maintenance and troubleshooting
Section 1: Planning
This section provides further information about the planning area of the test:
򐂰 Given a Security Analysis Document, produce product deployment
recommendations that meet security requirements as verified via review
cycles.
With emphasis on performing the following steps:
Interview administrators, users, and security team.
Determine the type of user registry used for the secure domain.
Determine authentication mechanisms—user IDs/passwords (basic or
forms-based), certificates, SecurID tokens, or custom authentication
mechanisms.
Identify customization requirements such as External Authorization
Services, External Authentication C API, Policies, and so on).
Identify auditing and logging requirements.
Determine account and password management rules.
򐂰 Given Access Manager for e-business deployment recommendations and the
customer's current network configuration, define an Access Manager for
e-business system layout and produce a deployment document containing a
network topology diagram with placement of Access Manager for e-business
user registry and servers.
With emphasis on performing the following steps:
Identify capacity requirements (number of users, concurrent users,
junctioned Web servers, ACLs required).
Identify Reliability and Serviceability (RAS) requirements (24 hours x 7
days; throughput and recovery capability).
Identify current network and security aspects (geography of LANs,
firewalls, Internet, intranet, DMZ, and so on).
Chapter 1. Certification overview 9
Create logical configuration (number and type of Access Manager for
e-business servers, number of load balancers, replicated Web servers,
secure domains) and integrate with other applications.
Create physical configuration (location of Access Manager for e-business
servers, location of load balancers, and relationship to firewalls).
Determine number and location of user registries.
򐂰 Given an existing Access Manager for e-business environment, define a
migration strategy to maintain user data as well as security policy data.
With emphasis on performing the following steps:
Create a roadmap defining the migration strategy.
Identify required user registry migration or upgrade procedures.
Identify migration and backup utilities required to perform migration.
Identify Access Manager for e-business security policy data to be migrated
and determine procedures to perform.
Section 2: Installation
This section provides further information about the installation area of the test:
򐂰 Given a PKI product, configure a valid client-side certificate so that a user can
successfully authenticate to Access Manager for e-business.
With emphasis on performing the following steps:
Load Certificate Authority (CA) root certificate(s) into WebSEAL (CA root
comes from PKI product).
Enable client-side certificate authentication.
Configure client-side certificates.
򐂰 Given the Access Manager for e-business packages and necessary
hardware, perform the Access Manager for e-business installation to produce
a working Access Manager for e-business system.
With emphasis on performing the following steps:
Install Access Manager for e-business user registry if not installed.
Complete Access Manager for e-business user registry customization.
Install LDAP clients on the computers to be used for Access Manager for
e-business servers.
Install the Access Manager for e-business server components.
Complete advanced Access Manager for e-business customization.
򐂰 Given user account information, create a registry usable by Access Manager
for e-business.

Get Certification Study Guide: IBM Tivoli Access Manager for e-business 6.0 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.