Base installation and configuration
In this chapter, we describe the technical implementation of the IBM Security Access Manager for Enterprise Single Sign-On base environment. First, we explain how to install the necessary components. Then, we describe how to deploy the enterprise single sign-on setup. Finally, we explain how to manage and maintain the deployed solution.
5.1 Design considerations
In this section, we focus on the concepts of a base-level implementation of IBM Security Access Manager for Enterprise Single Sign-On, and the components ...

Get Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.