Book description
Everyone feels the pain of too many passwords to remember. Everyone can relate to the security exposure of weak passwords, chosen for convenience. And, everyone can relate to passwords placed in proximity to the workstation for a quick reminder. Unfortunately, that note can allow more than the intended user into the system and network. The average user today often has four or more passwords. And, security policies that focus on password complexity and password-change frequency can cause even more difficulty for users.
This IBM® Redbooks® publication introduces IBM Security Access Manager for Enterprise Single Sign-On 8.2, which provides single sign-on to many applications, without a lengthy and complex implementation effort. Whether you are deploying strong authentication, implementing an enterprise-wide identity management initiative, or simply focusing on the sign-on challenges of a specific group of users, this solution can deliver the efficiencies and security that come with a well-crafted and comprehensive single sign-on solution.
This book is a valuable resource for security officers, administrators, and architects who want to understand and implement an identity management solution in a medium-scale environment.
This book is an update to the existing SG24-7350-01.
Table of contents
- Front cover
- Notices
- Preface
- Part 1 Architecture and design
-
Chapter 1. Business context
- 1.1 The single sign-on paradigm
-
1.2 Enterprise single sign-on today
- 1.2.1 Solving the password security paradox
- 1.2.2 Managing passwords in a security-rich fashion
- 1.2.3 Reducing help desk costs and improving employee productivity
- 1.2.4 Demonstrating compliance through auditing and reporting
- 1.2.5 Easy to deploy
- 1.2.6 High performance
- 1.2.7 Integrating with an enterprise identity management system
- 1.2.8 Bringing single sign-on to kiosk machines and virtual desktops
- 1.3 Considerations for deployment
- Chapter 2. Single sign-on architecture and component design
- Chapter 3. Solution design and management
- Part 2 Customer environment
- Chapter 4. Overview of scenario, requirements, and approach
-
Chapter 5. Base installation and configuration
- 5.1 Design considerations
-
5.2 Installing and configuring base components
- 5.2.1 Creating administrative users
- 5.2.2 Deploying the IMS Server Virtual Appliance
- 5.2.3 Starting the Virtual Appliance
- 5.2.4 Configuring the database server
- 5.2.5 Initial IMS Server configuration
- 5.2.6 Provisioning an IMS administrator and verifying the installation
- 5.2.7 Configuring user and machine policy templates
- 5.2.8 Deploying AccessAgent
- 5.2.9 Interacting with AccessAgent
- 5.2.10 Installing AccessStudio
- 5.3 Configuring AccessProfile
- 5.4 Managing the deployed environment
- 5.5 Conclusion
- Chapter 6. Password self-services implementation
- Chapter 7. Strong authentication using RFID
- Chapter 8. Roaming desktop implementation
- Chapter 9. Implementing operational requirements
- Part 3 Appendixes
- Appendix A. Renewing the Secure Sockets Layer certificate used by the IBM HTTP Server
- Appendix B. Advanced profiling
- Appendix C. Configuring strong authentication
- Related publications
- Back cover
Product information
- Title: Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2
- Author(s):
- Release date: September 2012
- Publisher(s): IBM Redbooks
- ISBN: 9780738437033
You might also like
book
40 Algorithms Every Programmer Should Know
Learn algorithms for solving classic computer science problems with this concise guide covering everything from fundamental …
book
Head First Design Patterns, 2nd Edition
You know you don’t want to reinvent the wheel, so you look to design patterns—the lessons …
book
Mastering Active Directory - Second Edition
Become an expert at managing enterprise identity infrastructure by leveraging Active Directory Key Features Explore the …
book
Solutions Architect's Handbook
From fundamentals and design patterns to the different strategies for creating secure and reliable architectures in …