Book description
Everyone feels the pain of too many passwords to remember. Everyone can relate to the security exposure of weak passwords, chosen for convenience. And, everyone can relate to passwords placed in proximity to the workstation for a quick reminder. Unfortunately, that note can allow more than the intended user into the system and network. The average user today often has four or more passwords. And, security policies that focus on password complexity and password-change frequency can cause even more difficulty for users.
This IBM® Redbooks® publication introduces IBM Security Access Manager for Enterprise Single Sign-On 8.2, which provides single sign-on to many applications, without a lengthy and complex implementation effort. Whether you are deploying strong authentication, implementing an enterprise-wide identity management initiative, or simply focusing on the sign-on challenges of a specific group of users, this solution can deliver the efficiencies and security that come with a well-crafted and comprehensive single sign-on solution.
This book is a valuable resource for security officers, administrators, and architects who want to understand and implement an identity management solution in a medium-scale environment.
This book is an update to the existing SG24-7350-01.
Table of contents
- Front cover
- Notices
- Preface
- Part 1 Architecture and design
-
Chapter 1. Business context
- 1.1 The single sign-on paradigm
-
1.2 Enterprise single sign-on today
- 1.2.1 Solving the password security paradox
- 1.2.2 Managing passwords in a security-rich fashion
- 1.2.3 Reducing help desk costs and improving employee productivity
- 1.2.4 Demonstrating compliance through auditing and reporting
- 1.2.5 Easy to deploy
- 1.2.6 High performance
- 1.2.7 Integrating with an enterprise identity management system
- 1.2.8 Bringing single sign-on to kiosk machines and virtual desktops
- 1.3 Considerations for deployment
- Chapter 2. Single sign-on architecture and component design
- Chapter 3. Solution design and management
- Part 2 Customer environment
- Chapter 4. Overview of scenario, requirements, and approach
-
Chapter 5. Base installation and configuration
- 5.1 Design considerations
-
5.2 Installing and configuring base components
- 5.2.1 Creating administrative users
- 5.2.2 Deploying the IMS Server Virtual Appliance
- 5.2.3 Starting the Virtual Appliance
- 5.2.4 Configuring the database server
- 5.2.5 Initial IMS Server configuration
- 5.2.6 Provisioning an IMS administrator and verifying the installation
- 5.2.7 Configuring user and machine policy templates
- 5.2.8 Deploying AccessAgent
- 5.2.9 Interacting with AccessAgent
- 5.2.10 Installing AccessStudio
- 5.3 Configuring AccessProfile
- 5.4 Managing the deployed environment
- 5.5 Conclusion
- Chapter 6. Password self-services implementation
- Chapter 7. Strong authentication using RFID
- Chapter 8. Roaming desktop implementation
- Chapter 9. Implementing operational requirements
- Part 3 Appendixes
- Appendix A. Renewing the Secure Sockets Layer certificate used by the IBM HTTP Server
- Appendix B. Advanced profiling
- Appendix C. Configuring strong authentication
- Related publications
- Back cover
Product information
- Title: Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2
- Author(s):
- Release date: September 2012
- Publisher(s): IBM Redbooks
- ISBN: 9780738437033
You might also like
book
Practical SharePoint 2013 Enterprise Content Management
Practical SharePoint 2013 Enterprise Content Management is the first book to guide you through planning and …
book
Protecting Data Privacy Beyond the Trusted System of Record
To help you safeguard your sensitive data and provide ease of auditability and control, IBM introduced …
book
Identity, Authentication, and Access Management in OpenStack
Keystone—OpenStack's Identity service—provides secure controlled access to a cloud’s resources. In OpenStack environments, Keystone performs many …
book
Designing an IAM Framework with Oracle Identity and Access Management Suite
Develop and Implement an End-to-End IAM Solution Maintain a high-performance, fully integrated security foundation across your …