ADD TO CART
Deploying an access control solution for a medium-size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, its deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an access control implementation. This IBM Redbook takes a step-by-step approach to implementing an access control solution based on IBM Tivoli Access Manager for e-business. Part 1 takes you through an example company profile with existing business policies and guidelines and builds an access control solution design for this particular environment. In Part 2, we describe how the new access control components can be integrated into the existing environment. Then we explain how to execute the access control integration tasks that must be implemented in order to create a fully functional end-to-end solution. This book does not introduce any general access control concepts, nor does it systematically explain all of Tivoli Access Manager's components and capabilities. Instead, those details are thoroughly discussed in the IBM Redbook Enterprise Security Architecture Using IBM Tivoli Security Solutions, SG24-6014-02.
© 2024 Vervante Corporation. All rights reserved.