Identity Management Design Guide with IBM Tivoli Identity Manager Identity Management Design Guide with IBM Tivoli Identity Manager

Identity Management Design Guide with IBM Tivoli Identity Manager

Publisher Description

Identity management is the concept of providing a unifying interface to manage all aspects related to individuals and their interactions with the business. It is the process that enables business initiatives by efficiently managing the user life cycle (including identity/resource provisioning for people (users)), and by integrating it into the required business processes. Identity management encompasses all the data and processes related to the representation of an individual involved in electronic transactions.

This IBM® Redbooks® publication provides an approach for designing an identity management solution with IBM Tivoli® Identity Manager Version 5.1. Starting from the high-level, organizational viewpoint, we show how to define user registration and maintenance processes using the self-registration and self-care interfaces as well as the delegated administration capabilities. Using the integrated workflow, we automate the submission/approval processes for identity management requests, and with the automated user provisioning, we take workflow output and automatically implement the administrative requests on the environment with no administrative intervention.

This book is a valuable resource for security administrators and architects who wish to understand and implement a centralized identity management and security infrastructure.

GENRE
Computing & Internet
RELEASED
2009
6 November
LANGUAGE
EN
English
LENGTH
704
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
9.8
MB
Enterprise Security Architecture Using IBM Tivoli Security Solutions Enterprise Security Architecture Using IBM Tivoli Security Solutions
2007
Addressing Identity, Access and Compliance Requirements using IBM Tivoli Identity and Access Assurance Addressing Identity, Access and Compliance Requirements using IBM Tivoli Identity and Access Assurance
2010
IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager
2011
Mastering Active Directory for Windows Server 2008 Mastering Active Directory for Windows Server 2008
2008
IBM FileNet P8 Platform and Architecture IBM FileNet P8 Platform and Architecture
2011
System Administration Guide for MicroStrategy 10 System Administration Guide for MicroStrategy 10
2015
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009
IBM Cognos Business Intelligence V10.1 Handbook IBM Cognos Business Intelligence V10.1 Handbook
2010