22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Preface<br />

This volume is the third <strong>IBM</strong>® Redbook about Lotus® security to be published.<br />

The previous two <strong>Redbooks</strong>, The Domino Defense: Security in Lotus Notes<br />

4.5 and the Internet, and Lotus Notes and Domino R5.0 Security Infrastructure<br />

Revealed, focused primarily on the strong security that has always been a part of<br />

the family of Lotus products. This redbook continues down the path set by these<br />

first two books, with the exception that it goes beyond simply <strong>cover</strong>ing Notes and<br />

Domino, incorporating topics pertaining to other collaborative products and<br />

solutions offered by Lotus and <strong>IBM</strong>.<br />

Overall, this redbook provides best practices for building a secure infrastructure,<br />

not only with Lotus Notes® and Domino, but with all Lotus collaborative<br />

technologies. To meet this goal, the book is broken into four main parts.<br />

The first part of this book introduces the basic concepts related to security, and<br />

<strong>cover</strong>s a number of methodologies for architecting and deploying security from<br />

beginning to end in an organization. This part of the book is most appropriate for<br />

those looking for a broad understanding of the IT security specialty.<br />

The second part of the book delves into the specific concepts and components<br />

involved in a secure infrastructure. This includes discussions about security<br />

zoning, single sign-on (SSO), public key infrastructure (PKI), and directory<br />

strategies. This part is most appropriate for those looking to expand their<br />

knowledge of the actual components used to build a secure infrastructure, and<br />

how Lotus technologies react and interface with such key security components.<br />

The third part of the book discusses the specific security features in the latest<br />

versions of Lotus products. Detailed security features of Lotus Notes and<br />

Domino 6, Sametime® 3, QuickPlace 2.08, Domino Web Access (iNotes),<br />

WebSphere® Portal, and other <strong>IBM</strong>/Lotus collaborative technologies are all<br />

discussed. This part is especially relevant to those readers who want to learn<br />

what is new in terms of security for specific Lotus products or are looking for hints<br />

and tips on securing specific Lotus products.<br />

Finally, the fourth part of the book provides a real-life scenario demonstrating the<br />

secure implementation of Lotus collaborative technologies, following the<br />

guidelines and best practices provided in the first three parts. This part can help<br />

all readers pull together the rest of the material in this book, and provides some<br />

implementation details for how to actually make some of these capabilities work.<br />

It is assumed that the reader has a good understanding of the basic concepts<br />

involved with the Lotus Notes and Domino security model, and a basic<br />

© Copyright <strong>IBM</strong> Corp. 2004. All rights reserved. xv

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!