IBM Security Solutions

From NovaOrdis Knowledge Base
Jump to navigation Jump to search

External

IBM Tivoli Access Manager

A complete, centralized authorization and network security policy solution solution for distributed applications. It provides security policy management, an authentication framework, an authorization framework, data security and centralized resource management capabilities.

The authentication framework supports built-in authenticators and supports external authenticators.

Authorization

The authorization service enforces security policies by comparing a user's authentication credentials

WebSEAL

A high-performance, multi-threaded Web server that applies fine-grained security policy to the Tivoli Access Manager-protected Web object space.

WebSEAL can provide single sign-on solutions and incorporate back end Web application server resources into its security policy. WebSEAL acts as a reverse proxy, receiving HTTP/HTTPs requests from browsers and delivering content from its own web servers. Requests passing through WebSEAL are evaluated by the Tivoli Access Manager authorization service to determine whether the user is authenticated and authorized to access the requested resource.

User Authentication

The process of authentication proves the identity of a user to WebSEAL. Only users with an entry in the user registry can become authenticated users.

Credential

When a user successfully authenticates to WebSEAL, a set of identification information known as credential is created for that user. The credential contains the user identity, group membership and any special ("extended") security attributes.

User Registry

The user registry is the user authentication information repository. TAM supports LDAP, Lotus Domino, Microsoft Active Directory. The user registry plays a role in the user authentication process.

Master Authorization Database

The master authorization database contains a representation of all resources in the domain (the protected object space). The security administrator can dictate any level of security by applying rules known as ACL (access control list) policies and protected object policies (POP).