O'Reilly logo

Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2 by Joris Van Herzele, Dirk Rahnenfuehrer, Nilesh Patel, Axel Buecker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Solution design and management
In this chapter, we highlight important aspects involved in the design of an IBM Security Access Manager for Enterprise Single Sign-On solution. When determining the most suitable installation and deployment strategy, we consider several functional requirements that are often encountered. We compare diverse operational environments and provide guidance about which scenario might best serve the needs of an organization. We describe how a high-availability solution architecture can be created either by using the traditional ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required