Solution design and management
In this chapter, we highlight important aspects involved in the design of an IBM Security Access Manager for Enterprise Single Sign-On solution. When determining the most suitable installation and deployment strategy, we consider several functional requirements that are often encountered. We compare diverse operational environments and provide guidance about which scenario might best serve the needs of an organization. We describe how a high-availability solution architecture can be created either by using the traditional ...

Get Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.