Enhancing Your Mobile Enterprise Security with IBM Worklight IBM Redbooks Solution Guide
|
|
|
- Rosanna Lamb
- 10 years ago
- Views:
Transcription
1 Enhancing Your Mobile Enterprise Security with IBM Worklight IBM Redbooks Solution Guide IBM Worklight mobile application platform helps organizations develop, deploy, host, and manage mobile enterprise applications. IBM Worklight provides tools for every stage of the mobile application development and deployment process. In addition, IBM Worklight integrates security into the entire mobile application lifecycle. As shown in Figure 1, the IBM Worklight platform is composed of the five main components: Worklight Studio, Application Center, Device Runtime, Server, and Console, which provide a flexible and robust solution for mobile application security. Figure 1. Main components of the IBM Worklight platform Enhancing Your Mobile Enterprise Security with IBM Worklight 1
2 Did you know? The Worklight security framework does not include its own user registry, credentials storage, or access control management. Instead, it delegates all those functions to the existing enterprise security infrastructure. The delegation allows the Worklight server to integrate as a presentation tier into the existing enterprise landscape and supports custom extensions that allow integration with any security mechanism. Business value When extending their business to mobile platforms, enterprises need a rich development environment so their applications can run on various mobile operating systems, including Android, BlackBerry, ios, and Windows Phone. They also must determine the application type they adopt: web, native, hybrid, or a combined approach. Enterprises must also tackle the following major mobile security threats: Loss and theft Malware Spam Phishing Bluetooth and Wi-Fi IBM Worklight supports multiple operating systems and devices with the simplicity of a single, shared code base. It can also be used in all mobile application types. Moreover, IBM Worklight safeguards mobile security at the device, application, and network layer: Protects sensitive information from malware attacks and device theft Ensures timely propagation and adoption of critical security updates to the entire installation base Enforces multi-factor authentication, single sign-on (SSO), and device SSO while integrating with existing authentication and security approaches Enables secure delivery and operation of mobile apps for employee-owned devices or device types that are not allowed on the corporate network Manages approved and rejected devices for controlled mobile-application installation and remote application disablement Enhancing Your Mobile Enterprise Security with IBM Worklight 2
3 Solution overview Figure 2 shows the mapping of mobile security objectives and IBM Worklight security capabilities, which are described in this section. Figure 2. The mapping of Worklight security capabilities to mobile security objectives Protecting data on the device On-device storage of data can be tampered with by malware on the device; if the device is lost or stolen, sensitive data can be extracted by unauthorized third parties. Worklight provides the following capabilities to protect data on the device: Encrypted offline cache Worklight encrypts data on the device by using advanced encryption standards (AES) and public-key cryptography standards (PCKS). The data can be stored on the device as a cache or in the Worklight mobile storage JSONStore. Offline authentication When applications are running on mobile devices that are not connected to the network, the need for user authentication still exists. The encrypted cache feature in Worklight can be used to achieve more offline authentication because only the correct passwords can unlock the offline cache. Secure challenge-response on startup Worklight provides extended authentication with a server by using secure challenges and responses. Enhancing Your Mobile Enterprise Security with IBM Worklight 3
4 Application and device authenticity Worklight provides application and device authenticity to ensure that only valid applications on authorized mobile devices can be used. Worklight generates a unique identification for the application and the device, and protects them from tampering by using digital signatures. Whenever the application tries to access back-end systems through the Worklight server, the server verifies the application authenticity and device authenticity if activated and allows access only from legitimate applications. Securing the application IBM Worklight protects the application and prevents hackers from unpackaging the legitimate mobile application and repackaging it with malicious code: Proven platform security IBM Worklight has security mechanisms that are deployed by enterprises with extreme security requirements, such as top-tier financial institutions. Running IBM Worklight on IBM WebSphere Application Server further strengthens its security features with those provided by WebSphere Application Server. SSL with server identity verification IBM Worklight enables a security-rich client and server communication over HTTPS to prevent data leakage and to prevent automatic server certificate verification to thwart known attacks, such as man-in-the-middle attack. Code protection Worklight provides capabilities to obfuscate and encrypt the application code and web resources to prevent tampering of the application. Enforcing security updates Worklight offers the direct update and remote disable features to help administrators ensure that critical updates to their applications are delivered in a timely manner: Direct update The direct update feature enables developers to drive updates of the web content of the deployed HTML5 and hybrid applications directly from the Worklight Server upon application start. Remote disable The remote disable feature provides administrators with the ability to disable the old version of the application for situations in which the distribution of a security fix requires that users get the new application version from the application store. Providing robust authentication and authorization Worklight provides the following features for authentication and authorization: Authentication integration framework Worklight provides a server-side architecture that integrates with a back-end authentication infrastructure that is based on JAAS with authentication realms and a client-side framework or asynchronous login requests on session expiration. Enhancing Your Mobile Enterprise Security with IBM Worklight 4
5 Data protection realm In Worklight, resources are protected by authentication realms. When a user attempts to access a protected resource, Worklight checks whether the user is already authenticated according to the process that is defined for the realm of the resource. If the user is not authenticated, Worklight triggers the challenge-response process of obtaining the client credentials and verifying them as defined in the realm. Device provisioning Worklight offers the device provisioning feature to validate device identities. Device IDs are used to identify unique devices with the Worklight server. A certificate must be created that is handled by an external trusted authority, which enhances security by signing the key pair. Streamlining corporate security processes IBM Worklight integrates with existing protocols to streamline and augment the existing security process. Applications that are built using Worklight are trusted entities that adhere to corporate security policies. The result is a quicker approval process, faster time to market, and increased confidence that risks are being mitigated. Enhancing Your Mobile Enterprise Security with IBM Worklight 5
6 Solution architecture This section outlines the solution architecture for using Worklight for mobile security. Security components Figure 3 shows the security components of IBM Worklight, the corresponding security features, and Worklight s integration with web gateways. Figure 3. Worklight security components Framework overview The IBM Worklight security framework serves two main goals: Controls access to the protected resources. Propagates the user or server identity to the back-end systems through the adapter framework. The Worklight security framework supports multi-factor authentication. This means that any protected resource can require multiple checks to control access. A protected resource can be an application, an adapter procedure, an event source, or a static resource. A typical example of multi-factor authentication is the combination of device, application, and user authentication. Enhancing Your Mobile Enterprise Security with IBM Worklight 6
7 Authentication architecture Each type of security check has its own configuration, and a configured check is called a realm. Multiple realms can be grouped in a named entity that is called a security test. The realms are defined in the authentication configuration file on the Worklight project level. A realm consists of two parts: The authenticator: Obtains the credentials from the client. The login module: Validates the credentials and builds the user identity. Each security check defines its own protocol, which is a sequence of challenges that are sent by the server and responses that are sent by the client: On the server side, the component that implements this private protocol is the authenticator. On the client side, the corresponding component is called the challenge handler. The Worklight security framework provides a wire protocol that allows for a combination of challenges and responses for multiple security checks to be included in a single request-and-response round trip. The protocol serves two important purposes: Minimizes the number of extra round trips between the client and the server. Separates the application business logic from the security check implementation. Figure 4 shows the Worklight authentication architecture. Figure 4. Worklight authentication architecture Enhancing Your Mobile Enterprise Security with IBM Worklight 7
8 Authentication flow Here is the authentication flow in Worklight: When the client request tries to access a protected resource, the Worklight Server checks all the appropriate realms that are specified in the defined security test. One or more realms can decide to send a challenge to the client. Challenges from multiple realms are composed into a single response and sent back to the client. The Worklight client security framework extracts the individual challenges from the response and routes them to the appropriate challenge handlers that are defined in the mobile application code. When a challenge handler finishes the processing, it submits its response to the Worklight client security framework. When all the responses are received, the Worklight client security framework resends the original request with all the challenge responses. The Worklight Server extracts those responses from the request and passes them to the appropriate authenticators. If an authenticator is satisfied, it reports a success and the Worklight Server calls the login module. If the login module succeeds in validating all of the credentials, the realm is considered successfully authenticated. If all the realms of the security test are successfully authenticated, the Worklight Server allows the request processing to proceed. If a realm check fails, its authenticator sends another or the same challenge to the client and the whole security challenge-response process repeats itself. Usage scenarios IBM Worklight solutions expand a broad range of industries and organizations. Use cases apply to financial institutions, healthcare, education, computer services, retail, and more. Financial institutions In this scenario, the fictional Banking Company A selects IBM Worklight as its mobile application platform. Banking Company A wants to build a secure platform, increase staff productivity, ensure secure and easy access for customers, and accelerate development and deployment. Building a secure platform Using IBM Worklight, Banking Company A is able to take advantage of its existing security system. Worklight integrates with the company s existing directories, data stores, and authentication mechanism. On the application level, Worklight enforces application updates in a timely manner and controls the authenticity of the applications on user devices. For on-device data, Worklight helps Banking Company A protect sensitive information from malware attacks and device theft by using AES256 and PCKS#5 encryption. Increasing staff productivity Employees at Banking Company A can perform daily tasks, such as balance inquiries and loan approvals, on mobile devices. Exceptional tasks, such as approving a loan after hours or from outside the office, require a second authority to verify the transaction approval. Banking Company A provides corporate-owned devices and also facilitate Bring Your Own Device (BYOD) (where it is approved for its employees). Enhancing Your Mobile Enterprise Security with IBM Worklight 8
9 Ensuring secure and easy access for customers Some customers of Banking Company A use both the mobile banking application and the stock trading application. The single sign-on feature of Worklight enables customers to start the other application if they are authenticated with one application already. Banking Company A wants to implement an additional authentication for high-value transactions of customers. It chooses to integrate Worklight with IBM Security Access Manager. Without required changes for the application, the company can add additional fraud detection systems to validate the location of the device and the time that the transaction is occurring. With the device provisioning and application authenticity features of Worklight, customers of Banking Company A have the liberty of registering multiple devices and disabling a device temporarily or permanently. Accelerating development and deployment Banking Company A uses IBM Worklight Studio to develop multi-platform applications so that its applications are consumable by most of its customers. As part of end-to-end security and vulnerability testing, Banking Company A employs the capabilities of the IBM Security AppScan suite to ensure endpoint security for their web-based systems and to perform static analysis on their mobile application source code. Banking Company A uses IBM Worklight Console to collect and analyze user statistics. Banking Company A can collect and analyze security-related data, including actual usage patterns, identify compromised or jail broken devices, and rapidly deploy new applications for testing and solicit and map feedback on its applications. Healthcare In this scenario, the fictional Hospital B also chooses IBM Worklight as its mobile application platform. Hospital B wants to build a secure platform, increase responsiveness and perceived value perception, and reduce multi-platform development costs. Building a secure platform IBM Worklight provides an extensible authentication model as part of its function. To comply with the Federal Information Processing Standards (FIPS), Hospital B uses Worklight with WebSphere Application Server for added protection. The hospital configures WebSphere Application Server to protect the application and adapters that are hosted on the IBM Worklight runtime environment. Using Worklight, Hospital B is able to grant access to data on a role, time, and location basis. Doctors can access patient records on mobile devices. However, it requires an additional authentication approval if they are at home or on call to review the latest observations of patients. In addition, although doctors have access to the information of their patients, medical suppliers have access to check inventory and update stock. Increasing responsiveness and perceived value perception Hospital B is looking for a communication solution to find employees anywhere in the hospital. Using Worklight, the hospital can build an application that allows instant and secure communication. Doctors and nurses can quickly find colleagues without stopping what they are doing. Doctors at Hospital B must input prescriptions when their mobile devices are not connected to the network. JSONStore, the document-oriented storage system in Worklight, ensures that the documents in the application are always available to doctors even when the devices running the application are offline. JSONStore also provides AES 256 encryption of confidential health information. Enhancing Your Mobile Enterprise Security with IBM Worklight 9
10 With the application, patients can pre-register for appointments and input their allergies and health history using mobile devices. Worklight uses Secure Sockets Layer with server identity verification and enables communication over HTTPS to protect the information. Reducing multi-platform development costs IBM Worklight provides a standards-based platform and allows Hospital B to use third-party libraries and frameworks. Using Worklight, Hospital B can also create mobile applications quickly by using any combination of HTML5, native, and hybrid development methods. Integration This section introduces two ways in which Worklight can integrate with other security solutions. Integration with container security Worklight Server is technically a web application that is hosted by an application server. Therefore, it is desirable to reuse the authentication capabilities of the application server for Worklight Server, and vice versa. To understand the differences between Worklight and web container authentication models, consider the following items: The Java Platform, Enterprise Edition model allows only one authentication scheme for a web application, with multiple resource collections that are defined by URL patterns with authentication constraints defined by a white list of role names. The Worklight model allows protection of each resource by multiple authentication checks, and the resources are not necessarily identified by the URL pattern. In some cases, authentication can be triggered dynamically during the request processing. As a result, the authentication integration between Worklight Server and the Java Platform, Enterprise Edition container is implemented as a custom Worklight realm. This realm can interact with the container and obtain and set its authenticated principal. Worklight Server includes a set of login modules and authenticators for WebSphere Application Server Full Profile and WebSphere Application Server Liberty Profile that implement this integration with LTPA tokens. Integration with web gateways Web gateways such as IBM WebSphere DataPower and IBM Security Access Manager (ISAM) provide user authentication so that only authenticated requests can reach the internal applications. The internal applications can obtain the result of the authentication that is performed by the gateway from a special header. Adding a web gateway to the Worklight deployment provides leading practice defense in-depth protection by authenticating clients in the DMZ and can add features such as content acceleration, scalability, and high availability with load balancing, content inspection, and risk based access. When Worklight Server is protected by a web gateway, the client requests first encounter the gateway. The gateway sends back an authentication challenge and validates the credentials, and if the validation is successful, submits the request to the Worklight Server. This sequence implies the following requirements on the Worklight security elements: The client-side challenge handler must be able to present the gateway's login mechanism, submit the credentials, and recognize the login failure and success. The authentication configuration must include the realm that can obtain and validate the token that is provided by the gateway. Enhancing Your Mobile Enterprise Security with IBM Worklight 10
11 The security test configuration must take into account that the user authentication is always performed first. Supported platforms IBM Worklight runs on the following operating systems: IBM AIX HP-UX Linux Mac OS Mobile OS Solaris Windows For more information about the software and hardware requirements of IBM Worklight, see System Requirements for IBM Worklight and IBM Mobile Foundation, found at Ordering information Ordering information is show in Table 1. Table 1. Ordering part numbers and feature codes Program name PID number IBM Worklight 5725-I43 IBM WebSphere Application Server 5724-J08 IBM WebSphere DataPower Service Gateway XG X IBM WebSphere DataPower Integration Appliance XI X IBM Security Access Manager 5725-C87 Related information For more information about IBM Worklight, see the following documents: Securing Your Mobile Business with IBM Worklight, SG IBM Worklight product page IBM Worklight V6.0 - technology overview IBM Worklight V6.0 information center IBM Worklight V6.0 data sheet Enhancing Your Mobile Enterprise Security with IBM Worklight 11
12 IBM Offering Information page (to search on announcement letters, sales manuals, or both): On this page, enter IBM Worklight, select the information type, and then click Search. On the next page, narrow your search results by geography and language. Enhancing Your Mobile Enterprise Security with IBM Worklight 12
13 Notices This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-ibm product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY U.S.A. The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law : INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-ibm Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk.ibm may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurement may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. Copyright International Business Machines Corporation All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Enhancing Your Mobile Enterprise Security with IBM Worklight 13
14 This document was created or updated on August 20, Send us your comments in one of the following ways: Use the online Contact us review form found at: ibm.com/redbooks Send your comments in an to: Mail your comments to: IBM Corporation, International Technical Support Organization Dept. HYTD Mail Station P South Road Poughkeepsie, NY U.S.A. This document is available online at Trademarks IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. These and other IBM trademarked terms are marked on their first occurrence in this information with the appropriate symbol ( or ), indicating US registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at The following terms are trademarks of the International Business Machines Corporation in the United States, other countries, or both: AIX AppScan DataPower IBM Redbooks (logo) WebSphere The following terms are trademarks of other companies: Worklight is trademark or registered trademark of Worklight, an IBM Company. Linux is a trademark of Linus Torvalds in the United States, other countries, or both. Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. Java, and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. Other company, product, or service names may be trademarks or service marks of others. Enhancing Your Mobile Enterprise Security with IBM Worklight 14
Improve your mobile application security with IBM Worklight
Improve your mobile application security with IBM Worklight Contents 1 Introduction 2 IBM Worklight overview 4 Enabling mobile security with IBM Worklight 6 Integrating IBM Worklight with enterprise security
IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide
IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide Automated Clearing House (ACH) payment volume is on the rise. NACHA, the electronic payments organization, estimates that
IBM PowerSC Technical Overview IBM Redbooks Solution Guide
IBM PowerSC Technical Overview IBM Redbooks Solution Guide Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure
Integrating ERP and CRM Applications with IBM WebSphere Cast Iron IBM Redbooks Solution Guide
Integrating ERP and CRM Applications with IBM WebSphere Cast Iron IBM Redbooks Solution Guide Cloud computing has become a business evolution that is impacting all facets of business today, including sales,
Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide
Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide Based on the open source Cloud Foundry technology, IBM Bluemix is an open-standard, cloud-based
Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide
Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide IBM Cognos Business Intelligence (BI) helps you make better and smarter business decisions faster. Advanced visualization
Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide
Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide Across 2014 and into 2015, microservices became the new buzzword for application development style. So what
Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide
Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide This IBM Redbooks Solution Guide provides an overview of how data backup and
IBM z13 for Mobile Applications
IBM z13 for Mobile Applications Octavian Lascu Mobile Adopt IBM z Systems Solution Guide IBM z13 for Mobile Applications IBM Redbooks Solution Guide In today s mobile era, over 10 billion devices are accessing
Platform LSF Version 9 Release 1.2. Migrating on Windows SC27-5317-02
Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Note Before using this information and the product it supports,
IBM Security QRadar Version 7.1.0 (MR1) Checking the Integrity of Event and Flow Logs Technical Note
IBM Security QRadar Version 7.1.0 (MR1) Checking the Integrity of Event and Flow Logs Technical Note Note: Before using this information and the product that it supports, read the information in Notices
Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide
Tivoli Endpoint Manager for Security and Compliance Analytics Setup Guide Setup Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
IBM Security QRadar Version 7.1.0 (MR1) Replacing the SSL Certificate Technical Note
IBM Security QRadar Version 7.1.0 (MR1) Technical Note Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 5 Copyright IBM Corp.
Enhancing Password Management by Adding Security, Flexibility, and Agility IBM Redbooks Solution Guide
Enhancing Password Management by Adding Security, Flexibility, and Agility IBM Redbooks Solution Guide The number of logins and passwords that employees must manage on a daily basis continues to be a source
Tivoli Endpoint Manager for Security and Compliance Analytics
Tivoli Endpoint Manager for Security and Compliance Analytics User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM
QLogic 4Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide
QLogic 4Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide The QLogic 4Gb Fibre Channel Expansion Card (CIOv) for BladeCenter enables you to quickly and simply
IBM TRIRIGA Anywhere Version 10 Release 4. Installing a development environment
IBM TRIRIGA Anywhere Version 10 Release 4 Installing a development environment Note Before using this information and the product it supports, read the information in Notices on page 9. This edition applies
QLogic 8Gb FC Single-port and Dual-port HBAs for IBM System x IBM System x at-a-glance guide
QLogic 8Gb FC Single-port and Dual-port HBAs for IBM System x IBM System x at-a-glance guide The QLogic 8Gb FC Single-port and Dual-port HBA for IBM System x are PCI Express 2.0 x8 8Gb Fibre Channel adapters
Redbooks Paper. Local versus Remote Database Access: A Performance Test. Victor Chao Leticia Cruz Nin Lei
Redbooks Paper Victor Chao Leticia Cruz Nin Lei Local versus Remote Database Access: A Performance Test When tuning a database for better performance, one area to examine is the proximity of the database
Sametime Version 9. Integration Guide. Integrating Sametime 9 with Domino 9, inotes 9, Connections 4.5, and WebSphere Portal 8.0.0.
Sametime Version 9 Integration Guide Integrating Sametime 9 with Domino 9, inotes 9, Connections 4.5, and WebSphere Portal 8.0.0.1 Edition Notice Note: Before using this information and the product it
IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 1/9. MagicDraw UML - IBM Rational Rhapsody. Integration
IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 1/9 MagicDraw UML - IBM Rational Rhapsody Integration IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 2/9 Notices Copyright IBM Corporation
Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series
Redpaper Alex Osuna Bert Jonker Richard Waal Henk Vonk Peter Beijer Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series Introduction This IBM Redpaper gives a example of procedures
IBM Enterprise Marketing Management. Domain Name Options for Email
IBM Enterprise Marketing Management Domain Name Options for Email Note Before using this information and the products that it supports, read the information in Notices on page 3. This document applies
IBM Cognos Controller Version 10.2.1. New Features Guide
IBM Cognos Controller Version 10.2.1 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 3. Product Information This document applies
Packet Capture Users Guide
IBM Security QRadar Version 7.2.2 Packet Capture Users Guide SC27-6512-00 Note Before using this information and the product that it supports, read the information in Notices on page 9. Copyright IBM Corporation
IBM Security QRadar Version 7.2.0. Installing QRadar with a Bootable USB Flash-drive Technical Note
IBM Security QRadar Version 7.2.0 Installing QRadar with a Bootable USB Flash-drive Technical Note Note: Before using this information and the product that it supports, read the information in Notices
Case Study: Process SOA Scenario
Redpaper Martin Keen Michele Chilanti Veronique Moses Scott Simmons Srinivasan Vembakkam Case Study: Process SOA Scenario This paper one in a series of service-oriented architecture (SOA) papers that feature
Patch Management for Red Hat Enterprise Linux. User s Guide
Patch Management for Red Hat Enterprise Linux User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003,
IBM RDX USB 3.0 Disk Backup Solution IBM Redbooks Product Guide
IBM RDX USB 3.0 Disk Backup Solution IBM Redbooks Product Guide The new IBM Removable Disk EXchange (RDX) USB 3.0 removable disk backup solution is designed to address your increasing capacity and backup
Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide
Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Note Before using this information and the product it supports,
Tivoli Endpoint Manager for Configuration Management. User s Guide
Tivoli Endpoint Manager for Configuration Management User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
Installing on Windows
Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Note Before using this information and the product it supports,
IBM Enterprise Marketing Management. Domain Name Options for Email
IBM Enterprise Marketing Management Domain Name Options for Email Note Before using this information and the product it supports, read the information in Notices on page 3. This document applies to all
Emulex 8Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide
Emulex 8Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide The Emulex 8Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter enables high-performance connection
Active Directory Synchronization with Lotus ADSync
Redbooks Paper Active Directory Synchronization with Lotus ADSync Billy Boykin Tommi Tulisalo The Active Directory Synchronization tool, or ADSync, allows Active Directory administrators to manage (register,
Introduction to IBM Worklight Mobile Platform
Introduction to IBM Worklight Mobile Platform The Worklight Mobile Platform The Worklight Mobile Platform is an open, complete and advanced mobile application platform for HTML5, hybrid and native apps.
Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management
IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo
IBM Flex System PCIe Expansion Node IBM Redbooks Product Guide
IBM Flex System PCIe Expansion Node IBM Redbooks Product Guide The IBM Flex System PCIe Expansion Node provides the ability to attach additional PCI Express cards, such as High IOPS SSD adapters, fabric
IBM FlashSystem. SNMP Guide
IBM FlashSystem SNMP Guide IBM FlashSystem SNMP Guide Note Before using this information and the product it supports, read the information in Notices on page 9. This edition applies to IBM FlashSystem
z/os V1R11 Communications Server system management and monitoring
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North
IBM Lotus Protector for Mail Encryption. User's Guide
IBM Lotus Protector for Mail Encryption User's Guide Version Information Lotus Protector for Mail Encryption User's Guide. Lotus Protector for Mail Encryption Version 2.1.0. Released December 2010. This
Release Notes. IBM Tivoli Identity Manager Oracle Database Adapter. Version 5.0.1. First Edition (December 7, 2007)
IBM Tivoli Identity Manager Version 5.0.1 First Edition (December 7, 2007) This edition applies to version 5.0 of Tivoli Identity Manager and to all subsequent releases and modifications until otherwise
Getting Started With IBM Cúram Universal Access Entry Edition
IBM Cúram Social Program Management Getting Started With IBM Cúram Universal Access Entry Edition Version 6.0.5 IBM Cúram Social Program Management Getting Started With IBM Cúram Universal Access Entry
IBM Security SiteProtector System Migration Utility Guide
IBM Security IBM Security SiteProtector System Migration Utility Guide Version 3.0 Note Before using this information and the product it supports, read the information in Notices on page 5. This edition
IBM Configuring Rational Insight 1.0.1.1 and later for Rational Asset Manager
IBM Configuring Rational Insight 1.0.1.1 and later for Rational Asset Manager Rational Insight and Rational Asset Manager...4 Prerequisites...5 Configuring the XML data configuration for Rational Asset
High Performance Computing Cloud Offerings from IBM Technical Computing IBM Redbooks Solution Guide
High Performance Computing Cloud Offerings from IBM Technical Computing IBM Redbooks Solution Guide The extraordinary demands that engineering, scientific, and research organizations place upon big data
IBM Endpoint Manager Version 9.2. Software Use Analysis Upgrading Guide
IBM Endpoint Manager Version 9.2 Software Use Analysis Upgrading Guide IBM Endpoint Manager Version 9.2 Software Use Analysis Upgrading Guide Upgrading Guide This edition applies to IBM Endpoint Manager
OS Deployment V2.0. User s Guide
OS Deployment V2.0 User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003, 2011. US Government Users
Broadcom NetXtreme Gigabit Ethernet Adapters IBM Redbooks Product Guide
Broadcom NetXtreme Gigabit Ethernet Adapters IBM Redbooks Product Guide The Broadcom NetXtreme Gigabit Ethernet Adapters are a family of high performance PCI Express adapters. With five adapters to choose
Linux. Managing security compliance
Linux Managing security compliance Linux Managing security compliance Note Before using this information and the product it supports, read the information in Notices on page 7. First Edition (December
IBM Tivoli Web Response Monitor
IBM Tivoli Web Response Monitor Release Notes Version 2.0.0 GI11-4068-00 +---- Note ------------------------------------------------------------+ Before using this information and the product it supports,
IBM SmartCloud Analytics - Log Analysis. Anomaly App. Version 1.2
IBM SmartCloud Analytics - Log Analysis Anomaly App Version 1.2 IBM SmartCloud Analytics - Log Analysis Anomaly App Version 1.2 Note Before using this information and the product it supports, read the
Tivoli Security Compliance Manager. Version 5.1 April, 2006. Collector and Message Reference Addendum
Tivoli Security Compliance Manager Version 5.1 April, 2006 Collector and Message Reference Addendum Copyright International Business Machines Corporation 2006. All rights reserved. US Government Users
IBM Security QRadar Version 7.2.0. Common Ports Guide
IBM Security QRadar Version 7.2.0 Common Ports Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 11. Copyright IBM Corp.
IBM Enterprise Content Management Software Requirements
IBM Enterprise Content Management Software Requirements This document describes the software prerequisite requirements for the IBM Enterprise Content Management suite of products. Last Updated: May 31,
DataPower z/os crypto integration
New in version 3.8.0 DataPower z/os crypto integration Page 1 of 14 DataPower z/os crypto integration NSS performs requested key operation using certificates and keys stored in RACF RACF Administrator
IBM VisualAge for Java,Version3.5. Remote Access to Tool API
IBM VisualAge for Java,Version3.5 Remote Access to Tool API Note! Before using this information and the product it supports, be sure to read the general information under Notices. Edition notice This edition
IBM TRIRIGA Application Platform Version 3.3.2. Reporting: Creating Cross-Tab Reports in BIRT
IBM TRIRIGA Application Platform Version 3.3.2 Reporting: Creating Cross-Tab Reports in BIRT Cheng Yang Application Developer IBM TRIRIGA Copyright International Business Machines Corporation 2013. US
Ubiquitous Computing, Pervasive Risk: Securely Deploy and Manage Enterprise Mobile Devices
Ubiquitous Computing, Pervasive Risk: Securely Deploy and Manage Enterprise Mobile Devices S. Rohit [email protected] Trends in Enterprise Mobility The need for business agility along with changing employee
ServeRAID H1110 SAS/SATA Controller for IBM System x IBM System x at-a-glance guide
ServeRAID H1110 SAS/SATA Controller for IBM System x IBM System x at-a-glance guide The ServeRAID H1110 SAS/SATA Controller for IBM System x offers a low-cost enterprise-grade RAID solution for internal
IBM DB2 Data Archive Expert for z/os:
Front cover IBM DB2 Data Archive Expert for z/os: Put Your Data in Its Place Reduce disk occupancy by removing unused data Streamline operations and improve performance Filter and associate data with DB2
IBM Flex System FC5022 2-port 16Gb FC Adapter IBM Redbooks Product Guide
IBM Flex System FC5022 2-port 16Gb FC Adapter IBM Redbooks Product Guide The network architecture on the IBM Flex System platform has been specifically designed to address network challenges, giving you
Remote Support Proxy Installation and User's Guide
IBM XIV Storage System Remote Support Proxy Installation and User's Guide Version 1.1 GA32-0795-01 IBM XIV Storage System Remote Support Proxy Installation and User's Guide Version 1.1 GA32-0795-01 Note
IBM Security QRadar Version 7.1.0 (MR1) Configuring Custom Email Notifications Technical Note
IBM Security QRadar Version 7.1.0 (MR1) Technical Note Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 7. Copyright IBM Corp.
IBM Network Advisor IBM Redbooks Product Guide
IBM Network Advisor IBM Redbooks Product Guide This IBM Redbooks Product Guide describes IBM Network Advisor Version 12.4. Although every network type has unique management requirements, most organizations
Software Usage Analysis Version 1.3
Software Usage Analysis Version 1.3 Catalog Editor s Guide Catalog Editor s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
IBM TRIRIGA Version 10 Release 4.2. Inventory Management User Guide IBM
IBM TRIRIGA Version 10 Release 4.2 Inventory Management User Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 19. This edition applies to
Implementing the End User Experience Monitoring Solution
IBM Tivoli Application Performance Management Implementing the End User Experience Monitoring Solution John Griffith Copyright International Business Machines Corporation 2012. US Government Users Restricted
Brocade Enterprise 20-port, 20-port, and 10-port 8Gb SAN Switch Modules IBM BladeCenter at-a-glance guide
Brocade Enterprise 20-port, 20-port, and 10-port 8Gb SAN Switch Modules IBM BladeCenter at-a-glance guide The Brocade Enterprise 20-port, 20-port, and 10-port 8 Gb SAN Switch Modules for IBM BladeCenter
IBM FileNet System Monitor 4.0.1.5. FSM Event Integration Whitepaper SC19-3116-00
IBM FileNet System Monitor 4.0.1.5 FSM Event Integration Whitepaper SC19-3116-00 Before using this information and the product it supports, read the information in Notices at the end of this document.
Tivoli IBM Tivoli Monitoring for Transaction Performance
Tivoli IBM Tivoli Monitoring for Transaction Performance Version 5.3.0 Evaluation Guide GC32-9190-00 Tivoli IBM Tivoli Monitoring for Transaction Performance Version 5.3.0 Evaluation Guide GC32-9190-00
CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher
Installing and using the webscurity webapp.secure client
Linux Utilities for IBM System z Installing and using the webscurity webapp.secure client SC33-8322-00 Linux Utilities for IBM System z Installing and using the webscurity webapp.secure client SC33-8322-00
Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide
Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide Securing sensitive client and company data is becoming an IT task of paramount importance. Often
Table 1 shows the LDAP server configuration required for configuring the federated repositories in the Tivoli Integrated Portal server.
Configuring IBM Tivoli Integrated Portal server for single sign-on using Simple and Protected GSSAPI Negotiation Mechanism, and Microsoft Active Directory services Document version 1.0 Copyright International
IBM Tivoli Service Request Manager 7.1
IBM Tivoli Service Request Manager 7.1 Using the e-mail listener and workflow to generate, query, update, and change the status of tickets Updated September 29, 2009 IBM Tivoli Service Request Manager
IBM WebSphere Message Broker - Integrating Tivoli Federated Identity Manager
IBM WebSphere Message Broker - Integrating Tivoli Federated Identity Manager Version 1.1 Property of IBM Page 1 of 18 Version 1.1, March 2008 This version applies to Version 6.0.0.3 of IBM WebSphere Message
ServeRAID M5000 Series Performance Accelerator Key for IBM System x IBM System x at-a-glance guide
:: Seite 1 von 13 :: Datenblatt zum Produkt IBM ServeRAID M5000 Series Performance Accel mit DC# 601672 :: ServeRAID M5000 Series Performance Accelerator Key for IBM System x IBM System x at-a-glance guide
IBM FileNet Capture and IBM Datacap
Front cover IBM FileNet Capture and IBM Datacap Kevin Bowe Redpaper Introduction This IBM Redpaper publication has various objectives. It uses a fictional capture processing scenario to identify the differences
IBM Proventia Management SiteProtector. Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1
IBM Proventia Management SiteProtector Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1 Copyright Statement Copyright IBM Corporation 1994, 2010. IBM Global Services Route
IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic
IBM Security IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic Version 3.0 Note Before using this information and the product it supports, read the information in Notices
Securing Your Mobile Business with IBM Worklight
Front cover Securing Your Mobile Business with IBM Worklight Apply Worklight security features to your mobile applications Integrate Worklight with IBM Security Access Manager Learn by example with practical
White paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
IBM Security Access Manager for Web
IBM Security Access Manager for Web Secure user access to web applications and data Highlights Implement centralized user authentication, authorization and secure session management for online portal and
Communications Server for Linux
Communications Server for Linux SNA connectivity ^business on demand software Multiple types of connectivity exist within the Communications Server for Linux. CSLinux_snaconn.ppt Page 1 of 10 SNA connectivity
Requesting Access to IBM Director Agent on Windows Planning / Implementation
Requesting Access to IBM Director Agent on Windows Planning / Implementation Main When IBM Director Server first discovers a managed system, that system might be initially locked (represented by padlock
FileNet Integrated Document Management Technical Bulletin
FileNet Integrated Document Management Technical Bulletin Version 4.0.3 Release May 2011 1 Contents Introduction... 3 Contact customer support... 3 Feedback... 3 Microsoft Windows Terminal Services...
IBM XIV Management Tools Version 4.7. Release Notes IBM
IBM XIV Management Tools Version 4.7 Release Notes IBM First Edition (September 2015) This edition applies to IBM XIV Management Tools version 4.7 release, and to all subsequent releases and modifications
IBM Tivoli Federated Identity Manager
IBM Tivoli Federated Identity Manager Employ user-centric federated access management to enable secure online business collaboration Highlights Enhance business-to-business and business-to-consumer collaborations
IBM Endpoint Manager for OS Deployment Windows Server OS provisioning using a Server Automation Plan
IBM Endpoint Manager IBM Endpoint Manager for OS Deployment Windows Server OS provisioning using a Server Automation Plan Document version 1.0 Michele Tomassi Copyright International Business Machines
IBM Endpoint Manager for Software Use Analysis Version 9 Release 0. Customizing the software catalog
IBM Endpoint Manager for Software Use Analysis Version 9 Release 0 Customizing the software catalog IBM Endpoint Manager for Software Use Analysis Version 9 Release 0 Customizing the software catalog
Redbooks Redpaper. IBM TotalStorage NAS Advantages of the Windows Powered OS. Roland Tretau
Redbooks Redpaper Roland Tretau IBM TotalStorage NAS Advantages of the Windows Powered OS Copyright IBM Corp. 2002. All rights reserved. ibm.com/redbooks 1 What is Network Attached Storage (NAS) Storage
WebSphere Application Server V6: Diagnostic Data. It includes information about the following: JVM logs (SystemOut and SystemErr)
Redbooks Paper WebSphere Application Server V6: Diagnostic Data Carla Sadtler David Titzler This paper contains information about the diagnostic data that is available in WebSphere Application Server V6.
IBM Lotus Enterprise Integrator (LEI) for Domino. Version 8.5.2. August 17, 2010
IBM Lotus Enterprise Integrator (LEI) for Domino Version 8.5.2 August 17, 2010 A) What's new in LEI V8.5.2 B) System requirements C) Installation considerations D) Operational considerations E) What's
Cúram Business Intelligence and Analytics Guide
IBM Cúram Social Program Management Cúram Business Intelligence and Analytics Guide Version 6.0.4 Note Before using this information and the product it supports, read the information in Notices at the
IBM Endpoint Manager. Security and Compliance Analytics Setup Guide
IBM Endpoint Manager Security and Compliance Analytics Setup Guide Version 9.2 IBM Endpoint Manager Security and Compliance Analytics Setup Guide Version 9.2 Note Before using this information and the
ServeRAID M5015 and M5014 SAS/SATA Controllers for IBM System x IBM Redbooks Product Guide
ServeRAID M5015 and M5014 SAS/SATA Controllers for IBM System x IBM Redbooks Product Guide The ServeRAID M5015 and ServeRAID M5014 SAS/SATA Controllers for IBM System x are the next-generation 6 Gbps SAS
Fundtech offers a Global Payments Solution on IBM Power Systems IBM Redbooks Solution Guide
Fundtech offers a Global Payments Solution on IBM Power Systems IBM Redbooks Solution Guide Transaction banking has become increasingly competitive, with greater focus on fee-for-service revenue, shortened
