Base installation and configuration
In this chapter, we describe the technical implementation of the IBM Security Access Manager for Enterprise Single Sign-On base environment. First, we explain how to install the necessary components. Then, we describe how to deploy the enterprise single sign-on setup. Finally, we explain how to manage and maintain the deployed solution.
5.1 Design considerations
In this section, we focus on the concepts of a base-level implementation of IBM Security Access Manager for Enterprise Single Sign-On, and the components ...