O'Reilly logo

Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2 by Joris Van Herzele, Dirk Rahnenfuehrer, Nilesh Patel, Axel Buecker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Business context
In this chapter, we describe the business context for IBM Security Access Manager for Enterprise Single Sign-On (ISAM ESSO). After a short description of the single sign-on paradigm, we describe the factors that influence why and how IBM Security Access Manager for Enterprise Single Sign-On can be implemented in a certain business context. Finally, we explain the challenges that you can expect to encounter when deploying an single sign-on solution in a large enterprise.
1.1 The single sign-on paradigm
While the purpose and benefits ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required