03.03.2015 Views

CA eTrust SiteMinder Policy Server Management

CA eTrust SiteMinder Policy Server Management

CA eTrust SiteMinder Policy Server Management

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Policy</strong> <strong>Server</strong> <strong>Management</strong> Overview<br />

<strong>Policy</strong> <strong>Server</strong> Overview<br />

The <strong>Policy</strong> <strong>Server</strong> provide access control and single sign-on. It typically runs<br />

on a separate Windows or UNIX system, and performs key security operations.<br />

In particular it provides the following:<br />

■<br />

■<br />

■<br />

■<br />

■<br />

Authentication--The <strong>Policy</strong> <strong>Server</strong> supports a range of authentication<br />

methods. It can authenticate users based on user names and passwords,<br />

via tokens, using forms based authentication, and through public-key<br />

certificates.<br />

Authorization--The <strong>Policy</strong> <strong>Server</strong> is responsible for managing and<br />

enforcing access control rules established by <strong>Policy</strong> <strong>Server</strong> administrators.<br />

These rules define the operations that are allowed for each protected<br />

resource.<br />

Administration--The <strong>Policy</strong> <strong>Server</strong> can be configured using the <strong>Policy</strong><br />

<strong>Server</strong> User Interface (UI). The Administration service of the <strong>Policy</strong> <strong>Server</strong><br />

is what enables the UI to record configuration information in the <strong>Policy</strong><br />

Store. The <strong>Policy</strong> Store is the database that contains entitlement<br />

information.<br />

Accounting--The <strong>Policy</strong> <strong>Server</strong> generates log files that contain auditing<br />

information about the events that occur within the system. These logs can<br />

be printed in the form of predefined reports, so that security events or<br />

anomalies can be analyzed.<br />

Health Monitoring--<strong>Policy</strong> <strong>Server</strong> provides health monitoring components<br />

16 <strong>Policy</strong> <strong>Server</strong> <strong>Management</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!