没有合适的资源?快使用搜索试试~ 我知道了~
ibm tam adminstrator guide
需积分: 3 35 浏览量
2011-06-23
16:38:57
上传
评论
收藏 4.25MB PDF 举报
温馨提示
最近在研究IBM Tivoli一系列的产品,文档只是Tivoli家族中的其中之一TAM
资源详情
资源评论
资源推荐

T
ivo
l
i
®
Access Manager for e-business
Administration
Guide
Version 6.1
SC23-6504-00


T
ivo
l
i
®
Access Manager for e-business
Administration
Guide
Version 6.1
SC23-6504-00

Note
Before using this information and the product it supports, read the information in Appendix H, “Notices,” on page 373.
This edition applies to version 6, release 1, modification 0 of IBM Tivoli Access Manager (product number 5724-C08)
and to all subsequent releases and modifications until otherwise indicated in new editions.
© Copyright International Business Machines Corporation 1999, 2008. All rights reserved.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.

Contents
About this publication . . . . . . . .ix
Intended audience . . . . . . . . . . . .ix
What this publication contains . . . . . . . .ix
Publications . . . . . . . . . . . . . .xi
IBM Tivoli Access Manager for e-business library xi
Related products and publications . . . . . xiii
Accessing terminology online . . . . . . . xiv
Accessing publications online . . . . . . . xiv
Ordering publications . . . . . . . . . . xiv
Accessibility . . . . . . . . . . . . . .xv
Tivoli technical training . . . . . . . . . .xv
Support information . . . . . . . . . . .xv
Conventions used in this publication . . . . . .xv
Typeface conventions . . . . . . . . . .xv
Operating system-dependent variables and
paths . . . . . . . . . . . . . . . xvi
Chapter 1. Tivoli Access Manager
overview . . . . . . . . . . . . . .1
Core technologies . . . . . . . . . . . . .1
Authentication . . . . . . . . . . . . .2
Authorization . . . . . . . . . . . . .2
Quality of Protection . . . . . . . . . . .2
Scalability . . . . . . . . . . . . . .3
Accountability . . . . . . . . . . . . .4
Centralized management . . . . . . . . .4
Security policy overview . . . . . . . . . .5
Authorization API standard . . . . . . . . .5
Authorization: conceptual model . . . . . . .6
The benefits of a standard authorization service .7
Tivoli Access Manager authorization service
overview . . . . . . . . . . . . . .8
The Tivoli Access Manager authorization service . .9
Components . . . . . . . . . . . . .9
Authorization service interfaces . . . . . .10
Replication for scalability and performance . . .10
Implementing a network security policy . . . . .11
Defining and applying security policy . . . .11
The authorization process: step-by-step . . . .13
The Tivoli Access Manager authorization API . . .14
Using the authorization API: examples . . . .14
Authorization API: remote cache mode . . . .15
Authorization API: local cache mode . . . . .16
External authorization capability . . . . . . .17
Extending the authorization service . . . . .17
Imposing conditions on resource requests . . .18
The authorization evaluation process . . . . .18
Implementing an external authorization service 20
Deployment strategies . . . . . . . . . .20
Chapter 2. Web Portal Manager . . . .23
Types of administration . . . . . . . . . .24
Delegate administration tasks . . . . . . . .24
Self-care . . . . . . . . . . . . . .24
Self-registration . . . . . . . . . . . .24
Web Portal Manager common tasks . . . . . .25
Starting Web Portal Manager . . . . . . .25
Logging in and signing off . . . . . . . .25
Accessing online help . . . . . . . . . .26
Customizing the Web Portal Manager interface . .26
Customizing the images . . . . . . . . .26
Self-registration tasks . . . . . . . . . . .27
Performing self-registration . . . . . . . .27
Changing Java Server Pages . . . . . . . .28
Chapter 3. Tivoli Access Manager
administration . . . . . . . . . . .31
Domains . . . . . . . . . . . . . . .31
Protected object space . . . . . . . . . . .32
Users and groups . . . . . . . . . . . .34
Security policy . . . . . . . . . . . . .35
ACL policies . . . . . . . . . . . . . .36
Using ACL policies with the authorization service 36
Evaluating ACL policies . . . . . . . . .37
Protected object policies . . . . . . . . . .38
Authorization rules . . . . . . . . . . . .38
How authorization rules differ . . . . . . .38
When to use authorization rules . . . . . .39
Guidelines for a secure object space . . . . . .39
Chapter 4. Default security policy . . .41
Default administration users and groups . . . .41
iv-admin group . . . . . . . . . . . .41
sec_master user . . . . . . . . . . . .41
ivmgrd-servers group . . . . . . . . . .41
Administration users . . . . . . . . . .41
Defining and applying security policy . . . . .43
ACL policies . . . . . . . . . . . . .43
Protected object policies . . . . . . . . .43
Authorization rules . . . . . . . . . . .44
Sparse security policy model . . . . . . . .45
Security policy inheritance . . . . . . . .45
default-root ACL policy . . . . . . . . .46
Control permission . . . . . . . . . . .46
Traverse permission . . . . . . . . . .46
Resolving an access request . . . . . . . .47
Applying ACL policies to different object types 48
ACL policy inheritance example . . . . . .48
Default ACL policies . . . . . . . . . . .49
default-root ACL policy . . . . . . . . .49
default-management ACL policy . . . . . .50
default-replica ACL policy . . . . . . . .50
default-config ACL policy . . . . . . . .50
default-gso ACL policy . . . . . . . . .50
default-policy ACL policy . . . . . . . .50
default-domain ACL policy . . . . . . . .51
default-proxy ACL policy . . . . . . . . .51
/Management permissions . . . . . . . . .51
/Management/ACL permissions . . . . . .51
/Management/Action permissions . . . . .52
© Copyright IBM Corp. 1999, 2008 iii
剩余423页未读,继续阅读















eudemon10
- 粉丝: 0
- 资源: 1
上传资源 快速赚钱
我的内容管理 收起
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助


会员权益专享
安全验证
文档复制为VIP权益,开通VIP直接复制

评论0