ORPP logo
Image from Google Jackets

Secure Portal Using WebSphere Portal V5 and Tivoli Access Manager V4.1.

By: Material type: TextTextPublisher: Durham : I B M, 2003Copyright date: ©2003Edition: 1st edDescription: 1 online resource (282 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780738498539
Subject(s): Genre/Form: Additional physical formats: Print version:: Secure Portal Using WebSphere Portal V5 and Tivoli Access Manager V4.1LOC classification:
  • TK5105.8885.W43 -- S43 2003eb
Online resources:
Contents:
Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. Introduction -- 1.1 Introduction -- 1.1.1 Portal -- 1.1.2 Security -- 1.1.3 A secure portal -- 1.2 WebSphere Portal -- 1.2.1 The WebSphere Portal family -- 1.2.2 WebSphere Portal security -- 1.3 Tivoli Access Manager for e-business -- 1.3.1 IBM Directory Server -- 1.4 Structure of this redbook -- Chapter 2. Requirements and design -- 2.1 Requirements analysis -- 2.1.1 Functional requirements -- 2.1.2 Non-functional requirements -- 2.2 Solution design -- 2.2.1 Functional view -- 2.2.2 Operational view -- 2.2.3 Walkthroughs -- 2.3 Design guidelines -- 2.3.1 Centralized or local control -- 2.3.2 User registry -- 2.3.3 Encryption -- 2.3.4 Network infrastructure -- 2.3.5 Access management -- 2.3.6 Product choices -- 2.3.7 Future needs -- 2.4 Summary -- Chapter 3. Technology options -- 3.1 Software components -- 3.1.1 WebSphere Portal -- 3.2 Security considerations -- 3.2.1 Secure Socket Layer (SSL) and Transport Layer Security (TLS) -- 3.2.2 External Security Manager with WebSphere Portal -- 3.3 Summary -- Chapter 4. Installing the runtime environment -- 4.1 Planning -- 4.1.1 Hardware and software configurations -- 4.1.2 High-level implementation steps -- 4.2 Installing WebSphere Portal Server -- 4.2.1 Creating an administrative user -- 4.2.2 WebSphere Portal Server installation program -- 4.2.3 Verifying WebSphere Portal Server installation -- 4.3 Installing IBM Directory Server -- 4.3.1 IBM Directory Server installation program -- 4.4 Installing IBM Directory Client -- 4.4.1 IBM Directory Client installation program -- 4.5 Installing Tivoli Access Manager components -- 4.5.1 Installing Policy Server -- 4.5.2 Installing Authorization Server -- 4.5.3 Installing WebSEAL.
4.5.4 Verifying Tivoli Access Manager installation -- 4.5.5 Installing Fix Packs for Tivoli Access Manager -- 4.5.6 Installing Tivoli Access Manager Java Runtime Environment -- 4.5.7 Configuring Tivoli Access Manager Java Runtime Environment -- Chapter 5. Configuring the runtime environment -- 5.1 High-level configuration steps -- 5.2 Configuring WebSphere with LDAP -- 5.2.1 Creating LDAP directory objects -- 5.2.2 Modifying LDAP Access Control -- 5.2.3 Setting up LDAP over SSL -- 5.2.4 Configuring Portal for LDAP using IBM Directory Server -- 5.3 Configuring WebSphere for SSL -- 5.3.1 Prerequisite tasks -- 5.3.2 Configuring the Web server for SSL -- 5.3.3 Configuring WebSphere Application Server for SSL -- 5.3.4 Configuring SSL between the Plugin and the Web container In WebSphere Application Server -- 5.3.5 Restricting the WebSphere Application Server ports -- 5.3.6 Modifying WebSphere Web Container to use Mutually Authenticated SSL -- 5.3.7 Testing the changes -- 5.4 Configuring TAM for authentication for WebSphere Portal Server -- 5.4.1 Configuring the WebSEAL Key Ring Database -- 5.4.2 Creating the WebSEAL junction -- 5.4.3 Importing WebSphere Portal users and groups -- 5.4.4 Enabling Trust Association Interceptor -- 5.4.5 Verifying Trust Association Interceptor operation -- 5.4.6 Tracing Trust Association -- 5.4.7 Changing Portal Logout and Login pages -- 5.4.8 Configuring mutual SSL: WebSEAL and IBM HTTP Server -- 5.5 Configuring TAM for authorization for WebSphere Portal Server -- 5.5.1 Modifying the Portal authorization configuration -- 5.5.2 Testing externalized authorization -- 5.5.3 Externalizing resources -- Chapter 6. Sample use cases -- 6.1 Introduction -- 6.2 UC01: Login -- 6.2.1 Use case demonstration -- 6.3 UC02: Update user profile -- 6.3.1 Use case demonstration -- 6.4 UC03: Customize the portal -- 6.4.1 Use case demonstration.
6.5 UC-ADM-01: Create a user -- 6.5.1 Use case demonstration -- 6.6 UC-ADM-02: Manage security profiles -- 6.6.1 Use case demonstration -- 6.7 Summary -- Appendix A. Access Control Model in WebSphere Portal V5 -- Overview -- Key concepts -- Related publications -- IBM Redbooks -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. Introduction -- 1.1 Introduction -- 1.1.1 Portal -- 1.1.2 Security -- 1.1.3 A secure portal -- 1.2 WebSphere Portal -- 1.2.1 The WebSphere Portal family -- 1.2.2 WebSphere Portal security -- 1.3 Tivoli Access Manager for e-business -- 1.3.1 IBM Directory Server -- 1.4 Structure of this redbook -- Chapter 2. Requirements and design -- 2.1 Requirements analysis -- 2.1.1 Functional requirements -- 2.1.2 Non-functional requirements -- 2.2 Solution design -- 2.2.1 Functional view -- 2.2.2 Operational view -- 2.2.3 Walkthroughs -- 2.3 Design guidelines -- 2.3.1 Centralized or local control -- 2.3.2 User registry -- 2.3.3 Encryption -- 2.3.4 Network infrastructure -- 2.3.5 Access management -- 2.3.6 Product choices -- 2.3.7 Future needs -- 2.4 Summary -- Chapter 3. Technology options -- 3.1 Software components -- 3.1.1 WebSphere Portal -- 3.2 Security considerations -- 3.2.1 Secure Socket Layer (SSL) and Transport Layer Security (TLS) -- 3.2.2 External Security Manager with WebSphere Portal -- 3.3 Summary -- Chapter 4. Installing the runtime environment -- 4.1 Planning -- 4.1.1 Hardware and software configurations -- 4.1.2 High-level implementation steps -- 4.2 Installing WebSphere Portal Server -- 4.2.1 Creating an administrative user -- 4.2.2 WebSphere Portal Server installation program -- 4.2.3 Verifying WebSphere Portal Server installation -- 4.3 Installing IBM Directory Server -- 4.3.1 IBM Directory Server installation program -- 4.4 Installing IBM Directory Client -- 4.4.1 IBM Directory Client installation program -- 4.5 Installing Tivoli Access Manager components -- 4.5.1 Installing Policy Server -- 4.5.2 Installing Authorization Server -- 4.5.3 Installing WebSEAL.

4.5.4 Verifying Tivoli Access Manager installation -- 4.5.5 Installing Fix Packs for Tivoli Access Manager -- 4.5.6 Installing Tivoli Access Manager Java Runtime Environment -- 4.5.7 Configuring Tivoli Access Manager Java Runtime Environment -- Chapter 5. Configuring the runtime environment -- 5.1 High-level configuration steps -- 5.2 Configuring WebSphere with LDAP -- 5.2.1 Creating LDAP directory objects -- 5.2.2 Modifying LDAP Access Control -- 5.2.3 Setting up LDAP over SSL -- 5.2.4 Configuring Portal for LDAP using IBM Directory Server -- 5.3 Configuring WebSphere for SSL -- 5.3.1 Prerequisite tasks -- 5.3.2 Configuring the Web server for SSL -- 5.3.3 Configuring WebSphere Application Server for SSL -- 5.3.4 Configuring SSL between the Plugin and the Web container In WebSphere Application Server -- 5.3.5 Restricting the WebSphere Application Server ports -- 5.3.6 Modifying WebSphere Web Container to use Mutually Authenticated SSL -- 5.3.7 Testing the changes -- 5.4 Configuring TAM for authentication for WebSphere Portal Server -- 5.4.1 Configuring the WebSEAL Key Ring Database -- 5.4.2 Creating the WebSEAL junction -- 5.4.3 Importing WebSphere Portal users and groups -- 5.4.4 Enabling Trust Association Interceptor -- 5.4.5 Verifying Trust Association Interceptor operation -- 5.4.6 Tracing Trust Association -- 5.4.7 Changing Portal Logout and Login pages -- 5.4.8 Configuring mutual SSL: WebSEAL and IBM HTTP Server -- 5.5 Configuring TAM for authorization for WebSphere Portal Server -- 5.5.1 Modifying the Portal authorization configuration -- 5.5.2 Testing externalized authorization -- 5.5.3 Externalizing resources -- Chapter 6. Sample use cases -- 6.1 Introduction -- 6.2 UC01: Login -- 6.2.1 Use case demonstration -- 6.3 UC02: Update user profile -- 6.3.1 Use case demonstration -- 6.4 UC03: Customize the portal -- 6.4.1 Use case demonstration.

6.5 UC-ADM-01: Create a user -- 6.5.1 Use case demonstration -- 6.6 UC-ADM-02: Manage security profiles -- 6.6.1 Use case demonstration -- 6.7 Summary -- Appendix A. Access Control Model in WebSphere Portal V5 -- Overview -- Key concepts -- Related publications -- IBM Redbooks -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.