22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

350 Lotus Security Handbook<br />

mentioned, we recommend that organizations that intend to automate account<br />

provisioning strongly consider implementation of a central master directory.<br />

8.4.2 Enterprise access controls<br />

8.5 Summary<br />

An overview of unified directories would not be complete without mentioning an<br />

emerging class of systems that enable consolidation of identity management and<br />

centralized access controls. In order to potentially include all enterprise<br />

applications from a variety of vendors, specialized security systems are required<br />

that manage identities and access controls. A complete SSO strategy typically<br />

includes identity management systems, consolidated directory systems, and<br />

advanced policies and procedures that are centrally managed and enforceable.<br />

Security systems that provide a central point of identity and access control<br />

management for disparate back-end systems are generically referred to as<br />

“enterprise access management systems.” Examples include <strong>IBM</strong> Tivoli Access<br />

Manager and Netegrity Siteminder.<br />

Organizations that pursue enterprise access management system<br />

implementations typically have the following characteristics:<br />

► Central or master LDAP directory strategy and architecture<br />

► Commitment to a centralized security administration policy and plan<br />

► Common access control criteria, such as standardized access group policies,<br />

standardized roles, and well-defined administration policies shared by all<br />

applications<br />

► Strategic direction to use Web access for all enterprise applications<br />

Large enterprises that have a large number of directories will require a significant<br />

investment in time and resource to implement a comprehensive SSO strategy<br />

using an enterprise access management system. However, the time required to<br />

provide an SSO architecture that supports a significant number of application<br />

platforms will be ultimately shorter using an enterprise access management<br />

system as opposed to taking a piecemeal approach.<br />

A detailed overview of <strong>IBM</strong> Tivoli Access Manager is in the <strong>IBM</strong> Redpaper <strong>IBM</strong><br />

Tivoli Access Manager for e-business, REDP3677.<br />

Multiple directories present a challenge to many organizations today. Data<br />

inconsistency across the directories is brought about by multiple points of control<br />

of the same or similar person data. Consolidating points of control requires either

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!