Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2 Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2

Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2

Publisher Description

Everyone feels the pain of too many passwords to remember. Everyone can relate to the security exposure of weak passwords, chosen for convenience. And, everyone can relate to passwords placed in proximity to the workstation for a quick reminder. Unfortunately, that note can allow more than the intended user into the system and network. The average user today often has four or more passwords. And, security policies that focus on password complexity and password-change frequency can cause even more difficulty for users.

This IBM® Redbooks® publication introduces IBM Security Access Manager for Enterprise Single Sign-On 8.2, which provides single sign-on to many applications, without a lengthy and complex implementation effort. Whether you are deploying strong authentication, implementing an enterprise-wide identity management initiative, or simply focusing on the sign-on challenges of a specific group of users, this solution can deliver the efficiencies and security that come with a well-crafted and comprehensive single sign-on solution.

This book is a valuable resource for security officers, administrators, and architects who want to understand and implement an identity management solution in a medium-scale environment.

This book is an update to the existing SG24-7350-01.

GENRE
Computers & Internet
RELEASED
2012
September 11
LANGUAGE
EN
English
LENGTH
494
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
9.1
MB
Security Guide for IBM i V6.1 Security Guide for IBM i V6.1
2009
Windows 7 Desktop Support and Administration Windows 7 Desktop Support and Administration
2010
Integrating IBM Security and SAP Solutions Integrating IBM Security and SAP Solutions
2012
Enterprise Security Architecture Using IBM Tivoli Security Solutions Enterprise Security Architecture Using IBM Tivoli Security Solutions
2007
Mastering Active Directory for Windows Server 2008 Mastering Active Directory for Windows Server 2008
2008
Microsoft Exchange Server 2007 For Dummies Microsoft Exchange Server 2007 For Dummies
2008
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009
Shell Scripting - A Primer Shell Scripting - A Primer
2014
What Is Node? What Is Node?
2011
Cyber Security: It's Personal Cyber Security: It's Personal
2017
Introduction to Artificial Intelligence for Security Professionals Introduction to Artificial Intelligence for Security Professionals
2017
iCloud iCloud
2013
Raspberry Pi Insider Guide Raspberry Pi Insider Guide
2014