Chapter 1. Certification overview 25
Developers guides
– IBM Tivoli Access Manager for e-business Version 6.0 Administration C
API Developer Reference, SC32-1692
– IBM Tivoli Access Manager Version 6.0 Administration Java Classes
Developer Reference, SC32-1692
Technical supplement
– IBM Tivoli Access Manager for e-business Version 6.0 Problem
Determination Guide, SC32-1701
To obtain the online publications for IBM Tivoli Access Manager for e-business,
visit the following Web site.
http://publib.boulder.ibm.com/tividd/td/IBMAccessManagerfore-business6.0.html
IBM Redbooks
Refer to the following IBM Tivoli Identity Manager-related Redbooks:
Enterprise Security Architecture Using IBM Tivoli Security Solutions,
SG24-6014
This redbook looks at Tivoli's overall Enterprise Security Architecture,
focusing on the integration of audit and compliance, access control, identity
management, and federation throughout extensive e-business enterprise
implementations. The available security product diversity in the marketplace
challenges everybody in charge of designing single secure solutions or an
overall enterprise security architecture. With Access Manager, Identity
Manager, Privacy Manager, Risk Manager, Federated Identity Manager,
Security Compliance Manager, Directory Server, and Directory Integrator,
Tivoli offers a complete set of products designed to address these
challenges.
This redbook describes the major logical and physical components of each of
the Tivoli products and it depicts several e-business scenarios with different
security challenges and requirements. By matching the desired Tivoli security
product criteria, it describes appropriate security implementations that meet
the targeted requirements.
Integrated Identity Management using IBM Tivoli Security Solutions,
SG24-6054
This redbook provides a solution-oriented overview of using Tivoli security
products to provide an implementation for integrated identity management
based on real-life customer experience.
When defining functional requirements for e-business-related projects, you
have to take into consideration a serious amount of security-related tasks and
disciplines. These disciplines are authentication and credential acquisition,