Identity management advanced design for IBM Tivoli identity manager
Identity and user lifecycle management projects are being deployed more and more frequently - and demand is growing. By demonstrating how IBM Tivoli Identity Manager can be made resilient and adapted to special functional requirements, this IBM Redbooks publication creates or enhances confidence in...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
San Jose, California
IBM Corporation
[2006]
|
Ausgabe: | [First edition]. |
Schriftenreihe: | Redbooks
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-094095701 | ||
003 | DE-627-1 | ||
005 | 20240228122046.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230802s2006 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)094095701 | ||
035 | |a (DE-599)KEP094095701 | ||
035 | |a (ORHE)0738494879 | ||
035 | |a (DE-627-1)094095701 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 658.872 |2 23/eng/20230919 | |
100 | 1 | |a Bücker, Axel |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Identity management advanced design for IBM Tivoli identity manager |c Axel Buecker, Andrew Annas, Alessandro Faustini, Takayoshi Sanui |
250 | |a [First edition]. | ||
264 | 1 | |a San Jose, California |b IBM Corporation |c [2006] | |
300 | |a 1 online resource (426 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Redbooks | |
500 | |a Includes bibliographical references and index | ||
520 | |a Identity and user lifecycle management projects are being deployed more and more frequently - and demand is growing. By demonstrating how IBM Tivoli Identity Manager can be made resilient and adapted to special functional requirements, this IBM Redbooks publication creates or enhances confidence in the IBM Tivoli Identity Manager-based solution for senior management, architects, and security administrators. Advanced design topics can start with infrastructure availability for all involved components, Web application, and database server clustering as well as LDAP multi-master setups, continuing with compliance challenges addressing enhanced auditing and reporting, and designing and creating your own self-care/self-registration application environment that embraces external users and business partners offering fine-tuned workflow options and lifecycle management capabilities. The powerful features and extensions of IBM Tivoli Identity Manager are opening doors into a world of advanced design and customization for every identity management challenge you might encounter. Please note that the additional material referenced in the text is not available from IBM. | ||
630 | 2 | 0 | |a IBM Tivoli identity manager |
650 | 0 | |a Electronic commerce |x Security measures | |
650 | 0 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 0 | |a Computer networks |x Access control | |
700 | 1 | |a Annas, Andrew |e VerfasserIn |4 aut | |
700 | 1 | |a Faustini, Alessandro |e VerfasserIn |4 aut | |
700 | 1 | |a Sanui, Takayoshi |e VerfasserIn |4 aut | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0738494879/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-094095701 |
---|---|
_version_ | 1818767378850250752 |
adam_text | |
any_adam_object | |
author | Bücker, Axel Annas, Andrew Faustini, Alessandro Sanui, Takayoshi |
author_facet | Bücker, Axel Annas, Andrew Faustini, Alessandro Sanui, Takayoshi |
author_role | aut aut aut aut |
author_sort | Bücker, Axel |
author_variant | a b ab a a aa a f af t s ts |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)094095701 (DE-599)KEP094095701 (ORHE)0738494879 |
dewey-full | 658.872 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.872 |
dewey-search | 658.872 |
dewey-sort | 3658.872 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02723cam a22004212 4500</leader><controlfield tag="001">ZDB-30-ORH-094095701</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228122046.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230802s2006 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)094095701</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP094095701</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0738494879</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)094095701</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.872</subfield><subfield code="2">23/eng/20230919</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bücker, Axel</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Identity management advanced design for IBM Tivoli identity manager</subfield><subfield code="c">Axel Buecker, Andrew Annas, Alessandro Faustini, Takayoshi Sanui</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Jose, California</subfield><subfield code="b">IBM Corporation</subfield><subfield code="c">[2006]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (426 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Redbooks</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Identity and user lifecycle management projects are being deployed more and more frequently - and demand is growing. By demonstrating how IBM Tivoli Identity Manager can be made resilient and adapted to special functional requirements, this IBM Redbooks publication creates or enhances confidence in the IBM Tivoli Identity Manager-based solution for senior management, architects, and security administrators. Advanced design topics can start with infrastructure availability for all involved components, Web application, and database server clustering as well as LDAP multi-master setups, continuing with compliance challenges addressing enhanced auditing and reporting, and designing and creating your own self-care/self-registration application environment that embraces external users and business partners offering fine-tuned workflow options and lifecycle management capabilities. The powerful features and extensions of IBM Tivoli Identity Manager are opening doors into a world of advanced design and customization for every identity management challenge you might encounter. Please note that the additional material referenced in the text is not available from IBM.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">IBM Tivoli identity manager</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Annas, Andrew</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Faustini, Alessandro</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sanui, Takayoshi</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0738494879/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-094095701 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:48:56Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (426 pages) illustrations |
psigel | ZDB-30-ORH |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | IBM Corporation |
record_format | marc |
series2 | Redbooks |
spelling | Bücker, Axel VerfasserIn aut Identity management advanced design for IBM Tivoli identity manager Axel Buecker, Andrew Annas, Alessandro Faustini, Takayoshi Sanui [First edition]. San Jose, California IBM Corporation [2006] 1 online resource (426 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Redbooks Includes bibliographical references and index Identity and user lifecycle management projects are being deployed more and more frequently - and demand is growing. By demonstrating how IBM Tivoli Identity Manager can be made resilient and adapted to special functional requirements, this IBM Redbooks publication creates or enhances confidence in the IBM Tivoli Identity Manager-based solution for senior management, architects, and security administrators. Advanced design topics can start with infrastructure availability for all involved components, Web application, and database server clustering as well as LDAP multi-master setups, continuing with compliance challenges addressing enhanced auditing and reporting, and designing and creating your own self-care/self-registration application environment that embraces external users and business partners offering fine-tuned workflow options and lifecycle management capabilities. The powerful features and extensions of IBM Tivoli Identity Manager are opening doors into a world of advanced design and customization for every identity management challenge you might encounter. Please note that the additional material referenced in the text is not available from IBM. IBM Tivoli identity manager Electronic commerce Security measures Business enterprises Computer networks Security measures Computer networks Access control Annas, Andrew VerfasserIn aut Faustini, Alessandro VerfasserIn aut Sanui, Takayoshi VerfasserIn aut TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/0738494879/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Bücker, Axel Annas, Andrew Faustini, Alessandro Sanui, Takayoshi Identity management advanced design for IBM Tivoli identity manager IBM Tivoli identity manager Electronic commerce Security measures Business enterprises Computer networks Security measures Computer networks Access control |
title | Identity management advanced design for IBM Tivoli identity manager |
title_auth | Identity management advanced design for IBM Tivoli identity manager |
title_exact_search | Identity management advanced design for IBM Tivoli identity manager |
title_full | Identity management advanced design for IBM Tivoli identity manager Axel Buecker, Andrew Annas, Alessandro Faustini, Takayoshi Sanui |
title_fullStr | Identity management advanced design for IBM Tivoli identity manager Axel Buecker, Andrew Annas, Alessandro Faustini, Takayoshi Sanui |
title_full_unstemmed | Identity management advanced design for IBM Tivoli identity manager Axel Buecker, Andrew Annas, Alessandro Faustini, Takayoshi Sanui |
title_short | Identity management advanced design for IBM Tivoli identity manager |
title_sort | identity management advanced design for ibm tivoli identity manager |
topic | IBM Tivoli identity manager Electronic commerce Security measures Business enterprises Computer networks Security measures Computer networks Access control |
topic_facet | IBM Tivoli identity manager Electronic commerce Security measures Business enterprises Computer networks Security measures Computer networks Access control |
url | https://learning.oreilly.com/library/view/-/0738494879/?ar |
work_keys_str_mv | AT buckeraxel identitymanagementadvanceddesignforibmtivoliidentitymanager AT annasandrew identitymanagementadvanceddesignforibmtivoliidentitymanager AT faustinialessandro identitymanagementadvanceddesignforibmtivoliidentitymanager AT sanuitakayoshi identitymanagementadvanceddesignforibmtivoliidentitymanager |