How-to Access RACF From Distributed Platforms
|
|
|
- Clyde Ferguson
- 10 years ago
- Views:
Transcription
1 How-to Access RACF From Distributed Platforms Saheem Granados IBM Wednesday, February 6,
2 Trademarks The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. CICS* DB2* IBM* IBM (logo)* OS/390* RACF* Websphere* z/os* * Registered trademarks of IBM Corporation The following are trademarks or registered trademarks of other companies. Identrus is a trademark of Identrus, Inc VeriSign is a trademark of VeriSign, Inc Microsoft, Windows and Windows NT are registered trademarks of Microsoft Corporation. * All other products may be trademarks or registered trademarks of their respective companies. Notes: Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput improvements equivalent to the performance ratios stated here. IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply. All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics will vary depending on individual customer configurations and conditions. This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area. All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Information about non-ibm products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any other claims related to non- IBM products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. Prices subject to change without notice. Contact your IBM representative or Business Partner for the most current pricing in your geography.
3 Agenda Why RACF from Distributed? LDAP Primer Intro to TDS for z/os RACF Authentication from Distributed RACF Authorization from Distributed RACF Audit Records from Distributed Retrieving RACF Profile Data from Distributed Summary Additional References
4 Why RACF from Distributed? Heavily invested in RACF for securing z-specific resources Enterprise is becoming more diverse Cost of Securing heterogeneous enterprises can increase if deploying many different security solutions for different platforms New Skills New Software/Hardware Centralization of security on z and RACF can be cost effective alternative Leverage existing Security Related procedures/skills LDAP facilitates the centralization of enterprise wide security in RACF 4
5 What is LDAP? Directory data repository Data stored in Entries managed in a hierarchical fashion, e.g., entries have parent entries Commonly used to store user repository data Also used to store application specific configuration data Each entry contains 1 or more attributes Every entry has a Distinguished Name attribute unique identifier of the entry Other attributes include password, native ID, etc.. Lightweight Directory Access Protocol A standard protocol for accessing/managing Directory data over TCP/IP Add, delete, modify entries Search entries Can be key to an enterprises IT security infrastructure Authentication of user Authorization
6 Directory Server for z/os Tivoli Directory Server is a LDAP server implementation fully optimized for z/os Not a port of distributed TDS server to z/os Supports standard LDAP V3 protocol z/os specific capabilities include Full sysplex support System SSL, ICSF, CTRACE, WLM, ARM, DB2, etc support LDAP based access to RACF data RACF still responsible for authorization LDAP-RACF relationship allows LDAP based remote authentication to be done by RACF Limited LDAP based access to RACF user, resource, and custom profiles LDAP plugin allows for remote RACF audit and authorization services.
7 Key LDAP Terms Distinguished Name (DN) Attribute in LDAP entry that uniquely identifies any given entry in the directory Made up attribute=value pairs separated by commas Format of DN is recursive, i.e., DN = RDN/Parent s DN RDN consist of attribute-value pairs within the entry Bind LDAP server authenticates a user Distinguished Name/Password or Passphrase Kerberos X.509 Certificate
8 Key LDAP Terms cont SDBM AN LDAP front-end to RACF Database Data is NOT duplicated in TDS Allows LDAP clients to retrieve profile data (user, group, resource) Allows TDS to have RACF perform authentication TDS sends RACF ID + password/passphrase to RACF to authenticate Native Authentication Standard LDAP user entries in TDS + a native user ID attribute TDS calls RACF to authenticate native user ID and password or passphrase
9 RACF Authentication Goal: RACF serves as Authentication Authority Use passwords/passphrases, Kerberos, or X.509 Certificates to authenticate Consider WebSphere Application Server Environment +SDBM
10 RACF Authentication cont Setup TDS: ds.conf (SDBM) # GLOBAL admindn cn=admin adminpw secret listen ldap://:1492 listen ldaps://:1493 audit on audit all,modify+delete+add+search+connect+disconnect+modifydn+bind+unbind+compare schemapath /home/suimgwi/ldap/test/r11db/schema logfile /home/suimgwi/ldap/test/conf.log # SDBM database sdbm GLDBSD31/GLDBSD64 mysdbm suffix cn=myracf enableresources on
11 RACF Authentication cont Ds.conf cont (TDBM+native Auth) # TDBM database tdbm GLDBTD31/GLDBTD64 TDBM1 suffix o=sample extendedgroupsearching on pwencryption sha dbuserid DBUSR101 dsnaoini SUIMGWI.PRIVATE.EZCONFIG(DSNAOINI) usenativeauth all nativeauthsubtree o=sample
12 RACF Authentication cont Setup WAS
13 ICTX: Remote RACF Authorization/SMF ICTX a TDS for z/os plug-in that add supports for remote RACF authorization and auditing over LDAP protocol Originally shipped with Enterprise Indentity Manager for z/os as of V1R8. Now shipped with TDS for z/os starting in V2R1 DS.conf update: plugin clientoperation GLDBIC31/GLDBIC64 ICTX_INIT CN=ICTX
14 ICTX: Remote RACF Authorization/SMF cont 1. Client must bind to TDS for z/os Native Auth SDBM bind RACF mapping Enabled Kerberos X.509 SASL External bind 2. Client must BER Encode ICTX Request and send to TDS for z/os 3. Client must BER Decode ICTX Response to check results
15 Remote RACF Authorization TDS issues RACROUTE REQUEST=AUTH SAF RACF Required Defines: RDEFINE FACILITY IRR.LDAP.REMOTE.AUTH UACC(NONE) PERMIT IRR.LDAP.REMOTE.AUTH CLASS(FACILITY) ID(BINDUSER) ACCESS(UPDATE)) SETROPTS RACLIST(FACILITY) REFRESH BER Encoding/Decoding Client must have code that encodes parameters in BER Encoded block Client must have code that decoded BER encoded response
16 Remote RACF Authorization Authorization Request ASN.1 requestvalue ::= SEQUENCE { requestversion INTEGER, itemlist SEQUENCE of item SEQUENCE { itemversion INTEGER, itemtag INTEGER, userorgroup OCTET STRING, resource OCTET STRING, class OCTET STRING, access INTEGER, logstring OCTET STRING } } }
17 Remote RACF Authorization Authorization Response ASN.1 responsevalue ::= SEQUENCE { responseversion INTEGER, responsecode INTEGER, itemlist SEQUENCE of item SEQUENCE { itemversion INTEGER, itemtag INTEGER, majorcode INTEGER, minorcode1 INTEGER, minorcode2 INTEGER, minorcode3 INTEGER } } }
18 Simple Remote RACF Authorization 1. User requests a distributed Application to access a resource in the enterprise Resource may have a profile in RACF or Application may need to map resource to an existing profile name in RACF (could use LDAP to manage mappings) 2. Distributed Application binds to TDS for z/os, using user s credentials. 3. Distributed Application encodes the ICTX Authorization Request and sends to TDS for z/os 4. Distributed Application decodes response 5. If success, the application grants access
19 Remote RACF Audit TDS issues r_auditx (IRRSAX00) SAF callable service SMF Record Type 83 subtype 4 records Unload using the IRRADU00 utility RACF controls determine if record written RACF Required Defines: RDEFINE FACILITY IRR.RAUDITX UACC(NONE) PERMIT IRR.RAUDITX CLASSS(FACILITY) ID(LDAPSRV) ACCESS(READ)) SETROPTS RACLIST(FACILITY) REFRESH BER Encoding/Decoding Client must have code that encodes parameters in BER Encoded block Client must have code that decoded BER encoded response
20 Remote RACF Audit Audit Request ASN.1 requestvalue ::= SEQUENCE { requestversion INTEGER, itemlist SEQUENCE of item SEQUENCE { itemversion INTEGER, itemtag INTEGER, linkvalue OCTET STRING SIZE(8), violation BOOLEAN, event INTEGER, qualifier INTEGER, class OCTET STRING, resource OCTET STRING, logstring OCTET STRING, datafieldlist SEQUENCE of datafield SEQUENCE { type INTEGER, value OCTET STRING } } }
21 Remote RACF Audit Audit Response ASN.1 responsevalue ::= SEQUENCE { responseversion INTEGER, responsecode INTEGER, itemlist SEQUENCE of item SEQUENCE { itemversion INTEGER, itemtag INTEGER, majorcode INTEGER, minorcode1 INTEGER, minorcode2 INTEGER, minorcode3 INTEGER } } }
22 Simple Remote RACF Audit 1. Administrator defines profiles for different operations in an application 2. Distributed Application binds to TDS for z/os May have a single/long living TDS connection for remote audit 3. Distributed Application encodes the ICTX Audit Request and sends to TDS for z/os 4. Distributed Application decodes response 5. If RACF controls set correctly, audit record will be written
23 SDBM: RACF Data and LDAP Add, modify, delete RACF users, groups, and general resources Add, modify, and delete user connections to groups Add and remove users and groups in general resource profiles Modify SETROPTS options that affect classes Retrieve RACF information for users, groups, connections, general resources, and class options Retrieve RACF user password and password phrase envelopes
24 SDBM: RACF Data and LDAP SDBM Backend Directory Hierarchy profiletype=user profiletype=group racfid=userid1 racfid=userid2 racfid=groupid1 racfid=groupid2 suffix profiletype=connect racfuserid=userid1+ racfgroupid=groupid1 racfuserid=userid2+ racfgroupid=groupid2 cn=setropts profiletype=class1 profiletype=class2 profilename=name1 profilename=name2 profilename=name3 profilename=namea Example DN: racfid=jon,profiletype=user,cn=sdbm
25 SDBM: RACF Data and LDAP
26 Common SDBM Commands Add a RACF user entry Create a file, u1234.ldif, containing an entry to be added: dn: racfid=u1234,profiletype=user,cn=sdbm objectclass: racfuser objectclass: racfuseromvssegment racfid: u1234 racfdefaultgroup: group1 racfowner: radmin racfattributes: special racfomvsuid: 1234 racfomvshome: /home/u1234 Invoke the ldapadd utility: ldapadd -D racfid=radmin,profiletype=user,cn=sdbm -w radminpw -f u1234.ldif SDBM executes under the context of bound (radmin) user: ADDUSER u1234 OWNER(radmin) DFLTGRP(group1) SPECIAL OMVS(UID(1234) HOME(/home/u1234))
27 Common SDBM Commands Display a RACF user-group connection: ldapsearch -L -D racfid=radmin,profiletype=user,cn=sdbm - w radminpw -b racfuserid=u1234+racfgroupid=group1,profiletype=connect,c n=sdbm objectclass=* SDBM executes under the context of bound (radmin) user: LISTUSER U1234 and returns group info for GROUP1
28 Common SDBM Commands: Search Results dn: racfuserid=u1234+racfgroupid=group1,profiletype=connect,cn=sdbm racfuserid: U1234 racfgroupid: GROUP1 racfconnectauthdate: 02/08/10 racfconnectowner: RACFID=RADMIN,PROFILETYPE=USER,CN=SDBM racfconnectgroupauthority: USE racfconnectgroupuacc: NONE racfconnectcount: 0 objectclass: TOP objectclass: RACFBASECOMMON objectclass: RACFCONNECT
29 Common SDBM Commands Refresh the FACILITY class Create file, refresh.ldif, containing the modification to the cn=setropts entry: dn: cn=setropts,cn=sdbm changetype: modify replace: racfsetroptsattributes racfsetroptsattributes: REFRESH - replace: racfraclist racfraclist: profiletype=facility,cn=sdbm Invoke the ldapmodify utility: ldapmodify -D racfid=radmin,profiletype=user,cn=sdbm -w radminpw -f refresh.ldif SDBM executes under the context of bound (radmin) user: SETROPTS REFRESH RACLIST(FACILITY)
30 Common SDBM Commands The ldapmodify utility can be used to change RACF password or password phrase Via SDBM backend: dn: racfid=u1234,profiletype=user,cn=sdbm replace: racfpassword racfpassword: anewpw Via LDBM or TDBM with native authentication: dn: cn=jon,o=ibm,c=us delete: userpassword userpassword: racfpw - add: userpassword userpassword: mynewpw Note: replace: userpassword is not supported when changing the RACF password with native authentication
31 SDBM Limitations SDBM uses the R_admin "run command" interface to implement many RACF related operations Output for search related operations have limits R_admin limits output to 4096 records LDAP wildcard searching not fully supported for SDBM LDAP attribute names are pre-defined and cannot be changed racfpassword for password cannot be customized SDBM subtree searching does not return all attributes Must do subtree search to retrieve DNs then a base level search for each DN to retrieve all the attributes
32 Conclusion TDS for z/os+racf allows for consolidation of IT security on System z, regardless of platform Existing skills and procedures can continue to be used Distributed Applications can Use RACF to perform all authentication Use RACF to perform all authorization Use RACF for centralized Auditing facility New as of V2R1: Use ICSF and System z crypto hardware, to manage/use cryptographic objects and keys
33 References z/os Hot Topics Newsletter 03.ibm.com/systems/z/os/zos/bkserv/hot_topics.html #22, March 2010: We ve got your back(bone) #25, August 2011: Don t judge an LDAP server by its name! #26, August 2012: z/os LDAP Plug-ins: Endless Opportunities z/os Publications IBM Tivoli Directory Server Client Programming for z/os IBM Tivoli Directory Server Messages and Codes for z/os IBM Tivoli Directory Server Plug-in Reference for z/os IBM Tivoli Directory Server Administration and Use for z/os IBM Education Assistant os/plugin_coverpage.html V1R11 Security Accessing RACF Resource Profiles through the IBM Tivoli Directory Server for z/os Introduction to configuring advanced replication in the IBM Tivoli Directory Server for z/os V1R12 Security Password policy in the IBM Tivoli Directory Server for z/os 33
34 References (cont ) IBM Redbooks: IBM Tivoli Directory Server for z/os IBM Redbooks: WebSphere Application Server on z/os and Security Integration
35 How-to Access RACF From Distributed Platforms Saheem Granados IBM Wednesday, February 6, Insert Custom Session QR if Desired.
PKI Services: The Best Kept Secret in z/os
PKI Services: The Best Kept Secret in z/os Wai Choi, CISSP IBM Corporation August 7th, 2014 Session: 15773 Trademarks The following are trademarks of the International Business Machines Corporation in
Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012
Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012 Wai Choi, CISSP IBM Corporation RACF/PKI Development & Design Poughkeepsie, NY e-mail: [email protected] 1 Trademarks
The Consolidation Process
The Consolidation Process an overview Washington System Center IBM US Gaithersburg SIG User Group April 2009 Trademarks The following are trademarks of the International Business Machines Corporation in
Digital Certificates Demystified
Digital Certificates Demystified Alyson Comer IBM Corporation System SSL Development Endicott, NY Email: [email protected] February 7 th, 2013 Session 12534 (C) 2012, 2013 IBM Corporation Trademarks The
The Digital Certificate Journey from RACF to PKI Services Part 2 Session J10 May 11th 2005
IBM eserver The Digital Certificate Journey from RACF to PKI Services Part 2 Session J10 May 11th 2005 Wai Choi IBM Corporation RACF Development Poughkeepsie, NY Phone: (845) 435-7623 e-mail: [email protected]
z/osmf Software Deployment Application- User Experience Enhancement Update
z/osmf Software Deployment Application- User Experience Enhancement Update Greg Daynes IBM Corporation August 8, 2012 Session Number 11697 Agenda Recent Enhancements Support for unmounted z/os UNIX file
Understanding Digital Certificates on z/os Share Anaheim, CA Session 8349 March 2nd 2011
Understanding Digital Certificates on z/os Share Anaheim, CA Session 8349 March 2nd 2011 Wai Choi, CISSP IBM Corporation RACF/PKI Development & Design Poughkeepsie, NY e-mail: [email protected] 1 Trademarks
SHARE in Pittsburgh Session 15591
Top 10 Things You Should Be Doing On Your HMC But You're NOT You Probably Are Tuesday, August 5th 2014 Jason Stapels HMC Development [email protected] Agenda Setting up HMC for Remote Use Securing User
CS z/os Network Security Configuration Assistant GUI
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Network Security Configuration Assistant GUI 1 Security configuration agenda CS z/os configuration GUI overview Network
CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher
z/os V1R11 Communications Server System management and monitoring Network management interface enhancements
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server System management and monitoring Network management interface enhancements z/os Communications
z/tpf FTP Client Support
z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Fall 2006 z/tpf FTP Client Support Name: Jason Keenaghan Venue: Main Tent AIM
Configuring and Tuning SSH/SFTP on z/os
Configuring and Tuning SSH/SFTP on z/os Kirk Wolf / Steve Goetze Dovetailed Technologies [email protected] dovetail.com Monday, March 10, 2014, 1:30PM Session: 14787 www.share.org Session Info/Eval link
Cloud Computing with xcat on z/vm 6.3
IBM System z Cloud Computing with xcat on z/vm 6.3 Thang Pham z/vm Development Lab [email protected] Trademarks The following are trademarks of the International Business Machines Corporation in the
EVERYTHING LDAP. Gabriella Davis [email protected]
EVERYTHING LDAP Gabriella Davis [email protected] Agenda What is LDAP? LDAP structure and behavior Domino and LDAP LDAP tools Notes as an LDAP client IBM Lotus Sametime, Quickr, Connections,
IBM WebSphere Data Interchange V3.3
IBM Software Group IBM WebSphere Data Interchange V3.3 This presentation will present an overview of the WebSphere Data Interchange product. IBM Software Group Page 1 of 14 Agenda IBM Software Group Electronic
IBM Systems and Technology Group Technical Conference
IBM TRAINING IBM STG Technical Conference IBM Systems and Technology Group Technical Conference Munich, Germany April 16 20, 2007 IBM TRAINING IBM STG Technical Conference E72 Storage options and Disaster
Chapter 3 Authenticating Users
Chapter 3 Authenticating Users Remote users connecting to the SSL VPN Concentrator must be authenticated before being allowed to access the network. The login window presented to the user requires three
Getting Started With WebSphere Liberty Profile on z/os
Getting Started With WebSphere Liberty Profile on z/os David Follis IBM August 12, 2013 Session Number 13597 Trademarks The following are trademarks of the International Business Machines Corporation in
Web Express Logon Reference
IBM WebSphere Host On-Demand Version 10 Web Express Logon Reference SC31-6377-01 IBM WebSphere Host On-Demand Version 10 Web Express Logon Reference SC31-6377-01 Note Before using this information and
Backups in the Cloud Ron McCracken IBM Business Environment
Backups in the Cloud Ron McCracken IBM August 8, 2011 Session 9844 Legal Information The following are trademarks of the International Business Machines Corporation in the United States and/or other countries.
IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready
Agenda Key: Session Number: 35CA 540195 IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready 8 Copyright IBM Corporation, 2008. All Rights Reserved. This publication may refer
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Rational Developer for IBM i (RDi) Introduction to RDi
IBM Software Group Rational Developer for IBM i (RDi) Introduction to RDi Featuring: Creating a connection, setting up the library list, working with objects using Remote Systems Explorer. Last Update:
LDAP and Integrated Technologies: A Simple Primer Brian Kowalczyk, Kowal Computer Solutions Inc., IL Richard Kerwin, R.K. Consulting Inc.
LDAP and Integrated Technologies: A Simple Primer Brian Kowalczyk, Kowal Computer Solutions Inc., IL Richard Kerwin, R.K. Consulting Inc., IL ABSTRACT SAS Integration Technologies and LDAP(Lightweight
Kerberos on z/os. Active Directory On Windows Server 2008. William Mosley z/os NAS Development. December 2011. Interaction with. [email protected].
Kerberos on z/os Interaction with Active Directory On Windows Server 2008 + William Mosley z/os NAS Development [email protected] December 2011 Agenda Updates to Windows Server 2008 Setting up Cross-Realm
How To Write An Architecture For An Bm Security Framework
Security Reference Architecture James (Jimmy) Darwin [email protected] 2010 IBM Corporation 0 Reference Architectures As part of the Time-to-Value Initiative, Reference Architectures have been identified
Importing data from Linux LDAP server to HA3969U
Importing data from Linux LDAP server to HA3969U Application Notes Abstract: This document describes how to import data and records from Linux LDAP servers to Storageflex HA3969U systems, and by doing
z/os Basics: z/os UNIX Shared File System environment and how it works
z/os Basics: Shared File System environment and how it works Jim Showalter IBM March 1, 2011 Session 9024 Trademarks The following are trademarks of the International Business Machines Corporation in the
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
Managing Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
Digital Certificate Goody Bags on z/os
Digital Certificate Goody Bags on z/os Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: [email protected] August 6 th, 2012 Session 11623 Agenda What is a Digital Certificate?
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
Managed Services - A Paradigm for Cloud- Based Business Continuity
Managed Services - A Paradigm for Cloud- Based Business Continuity Ron McCracken IBM 6 February 2013 Session Number 12993 Agenda This session is intended to expose key requirements for support of enterprise
Deploying a private database cloud on z Systems
Deploying a private database cloud on z Systems How DPS evolved over time and what is coming next SAP on z IBM Systems Conference Holger Scheller - IBM April 13 th, 2016 Trademarks The following are trademarks
Internet infrastructure. Prof. dr. ir. André Mariën
Internet infrastructure Prof. dr. ir. André Mariën 1 Lightweight Directory Access Protocol 2 Object Identifier Representation: dotted decimal OID not intended for end-users Universally unique Example:
BCPii for Dummies: Start to finish installation, setup and usage
SHARE Anaheim Winter 2011 BCPii for Dummies: Start to finish installation, setup and usage Steve Warren [email protected] z/os BCPii Design and Development This presentation is for educational purposes
Enabling secure communication for a Tivoli Access Manager Session Management Server environment
Enabling secure communication for a Tivoli Access Manager Session Management Server environment Skill Level: Advanced Authors: Jenny Wong ([email protected]) Software Engineer IBM Tivoli Software Simon
IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
z/os Firewall Technology Overview
z/os Firewall Technology Overview Mary Sweat E - Mail: [email protected] Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration
SuSE Linux High Availability Extensions Hands-on Workshop
SHARE Orlando August 2011 SuSE Linux High Availability Extensions Hands-on Workshop Richard F. Lewis IBM Corp [email protected] Trademarks The following are trademarks of the International Business Machines
IBM Crypto Server Management General Information Manual
CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.
Creating a Cloud Backup Service. Deon George
Creating a Cloud Backup Service Deon George Agenda TSM Cloud Service features Cloud Service Customer, providing a internal backup service Internal Backup Cloud Service Service Provider, providing a backup
Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management
IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo
Supporting Large-scale Deployments through Virtual Directory Technology. A White Paper by Phil Hunt Director, Product Management, OctetString, Inc.
Supporting Large-scale Deployments through Virtual Directory Technology A White Paper by Phil Hunt Director, Product Management, OctetString, Inc. February 2004 Table of Contents Introduction... 2 Clogged
Configuring User Identification via Active Directory
Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] User Identification Overview User Identification allows you to create security policies based
CA SiteMinder. Directory Configuration - OpenLDAP. r6.0 SP6
CA SiteMinder Directory Configuration - OpenLDAP r6.0 SP6 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Migrating LAMP stack from x86 to Power using the Server Consolidation Tool
Migrating LAMP stack from x86 to Power using the Server Consolidation Tool Naveen N. Rao Lucio J.H. Correia IBM Linux Technology Center November 2014 Version 3.0 1 of 24 Table of Contents 1.Introduction...3
WebSphere Process Server v6.2 WebSphere Enterprise Service Bus v6.2 WebSphere Integration Developer v6.2
IBM Software Group WebSphere Process Server v6.2 WebSphere Enterprise Service Bus v6.2 WebSphere Integration Developer v6.2 Mediation Policy and Service Gateway Brian Hulse; WESB Development Updated March
z/os V1R11 Communications Server system management and monitoring
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
IBM Tivoli Service Request Manager 7.1
IBM Tivoli Service Request Manager 7.1 Using the e-mail listener and workflow to generate, query, update, and change the status of tickets Updated September 29, 2009 IBM Tivoli Service Request Manager
IBM i Version 7.2. Security Single sign-on
IBM i Version 7.2 Security Single sign-on IBM i Version 7.2 Security Single sign-on Note Before using this information and the product it supports, read the information in Notices on page 83. This edition
USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity
USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
ClearPath Enterprise Servers
ClearPath Enterprise Servers Lightweight Directory Access Protocol (LDAP) Programming Guide ClearPath MCP 12.0 April 2008 . unisys imagine it. done. ClearPath Enterprise Servers Lightweight Directory Access
Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies
Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright
Planning LDAP Integration with EMC Documentum Content Server and Frequently Asked Questions
EMC Documentum Content Server and Frequently Asked Questions Applied Technology Abstract This white paper details various aspects of planning LDAP synchronization with EMC Documentum Content Server. This
User Management Resource Administrator. Managing LDAP directory services with UMRA
User Management Resource Administrator Managing LDAP directory services with UMRA Copyright 2005, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted
z/os Basics: z/os UNIX Shared File System environment and how it works
z/os Basics: Shared File System environment and how it works Jim Showalter IBM March 1, 2011 Session 9024 1 Trademarks The following are trademarks of the International Business Machines Corporation in
How to Secure Mainframe FTP
How to Secure Mainframe FTP Stu Henderson (301) 229-7187 [email protected] Scott Myers (408) 973-8374 [email protected] 1 AGENDA I. Introduction II. III. IV. How Mainframe FTP is Different Mainframe
Modifying the Active Directory Schema to Support Mac Systems
Modifying the Active Directory Schema to Support Mac Systems Strategies and Best Practices for Planning, Testing, and Deploying the Mac Successfully in Your Enterprise October 2009 2 Contents Page 3 Page
DataPower z/os crypto integration
New in version 3.8.0 DataPower z/os crypto integration Page 1 of 14 DataPower z/os crypto integration NSS performs requested key operation using certificates and keys stored in RACF RACF Administrator
Step- by- Step guide to extend Credential Sync between IBM WebSphere Portal 8.5 credential vault and Active Directory 2012 using Security Directory
Step- by- Step guide to extend Credential Sync between IBM WebSphere Portal 8.5 credential vault and Active Directory 2012 using Security Directory Integrator (ex TDI) on Red- Hat (part 3) Summary STEP-
CA SiteMinder. Directory Configuration Guide. r6.0 SP6. Second Edition
CA SiteMinder Directory Configuration Guide r6.0 SP6 Second Edition This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance
An Oracle Technical White Paper November 2014 How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance Table of Contents Introduction...3 Active Directory LDAP Services...4
X.500 and LDAP Page 1 of 8
X.500 and LDAP Page 1 of 8 Introduction OCLC has completed its investigation of the two proposed electronic access protocols for the ILL Policies Directory. The first is X.500, a directory protocol standard
Integrating AIX into Heterogeneous LDAP Environments
Front cover Integrating AIX into Heterogeneous LDAP Environments Describes the latest integration methods based on AIX 5L Version 5.3 with the 5300-03 Recommended Maintenance Package Provides detailed
WirelessOffice Administrator LDAP/Active Directory Support
Emergin, Inc. WirelessOffice Administrator LDAP/Active Directory Support Document Version 6.0R02 Product Version 6.0 DATE: 08-09-2004 Table of Contents Objective:... 3 Overview:... 4 User Interface Changes...
System z Batch Network Analyzer Tool (zbna) - Because Batch is Back!
System z Batch Network Analyzer Tool (zbna) - Because Batch is Back! John Burg IBM March 5, 2015 Session Number 16805 Insert Custom Session QR if Desired. Trademarks The following are trademarks of the
Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer
Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer Session 11523 August 8, 2012 Mike Bonett IBM Corporation, IBM Advanced Technical Skills [email protected] 1 Corporation Trademarks
Directory Configuration Guide
Entrust IdentityGuard 8.1 Directory Configuration Guide Document issue: 1.0 Date of Issue: June 2006 Copyright 2006 Entrust. All rights reserved. Entrust is a trademark or a registered trademark of Entrust,
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server Resolver DNS cache z/os Communications Server Development, Raleigh, North Carolina This presentation describes enhancements
IBM DB2 Data Archive Expert for z/os:
Front cover IBM DB2 Data Archive Expert for z/os: Put Your Data in Its Place Reduce disk occupancy by removing unused data Streamline operations and improve performance Filter and associate data with DB2
Cryptographic Keys Life Cycle Management for your Company
Cryptographic Keys Life Cycle Management for your Company Session: SAD-6800 Torben Aaes-Jørgensen, Crypto Competency Center Agenda 1 Relevance of Encryption technologies 2 IBM Crypto Competency Center
Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.
Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,
The Integration of LDAP into the Messaging Infrastructure at CERN
The Integration of LDAP into the Messaging Infrastructure at CERN Ray Jackson CERN / IT-IS Group 29 Nov 2000 16:00 CERN IT Auditorium, bldg. 31, 3-005 A bit about me Technical Student Sep 1997-1998 in
LDAP Directory Integration with Cisco Unity Connection
CHAPTER 6 LDAP Directory Integration with Cisco Unity Connection The Lightweight Directory Access Protocol (LDAP) provides applications like Cisco Unity Connection with a standard method for accessing
Positioning the Roadmap for POWER5 iseries and pseries
Positioning the Roadmap for POWER5 iseries and pseries Guy Paradise Larry Amy Ian Jarman Agenda The Case For Common Platforms Diverse Markets: the pseries and iseries Common Platform: the Roadmap for pseries
Enterprise Security: Building On All Your Assets
Covariant Inc. Enterprise Security: Building On All Your Assets Neil Beesley Covariant Inc [email protected] Friday August 10 th 2012 Session: 11369 Part 1: Introduction Security requirements
Mobile Devices: Server and Management Lesson 06 Device Management
Mobile Devices: Server and Management Lesson 06 Device Management Oxford University Press 2007. All rights reserved. 1 Device Management (DM) Many types of devices in a mobile network Managed by a mobile
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
CONFIGURING ACTIVE DIRECTORY IN LIFELINE
White Paper CONFIGURING ACTIVE DIRECTORY IN LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Test Environment 2 Joining a Lenovo network storage device to an AD domain 3 Importing Domain Users
z/os 1.12 zfs Shared File System Update
z/os 1.12 zfs Shared File System Update Speaker Name: Ann Totten Speaker Company IBM Corporation Date of Presentation: Wednesday, August 4, 2010: 1:30-2:30 PM Session Number: 7507 [email protected]
IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8
IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2008 2015 VASCO Data Security, Inc., VASCO Data Security International
Tools for Managing Big Data Analytics on z/os
Tools for Managing Big Data Analytics on z/os Mike Stebner, Joe Sturonas PKWARE, Inc. Wednesday, March 12, 2014 Session ID 14948 Test link: www.share.org Introduction Heterogeneous Analysis Addressing
TSM (Tivoli Storage Manager) Backup and Recovery. Richard Whybrow Hertz Australia System Network Administrator
TSM (Tivoli Storage Manager) Backup and Recovery Richard Whybrow Hertz Australia System Network Administrator 2 Preparation meets success 3 Hertz Service Delivery Hertz has over 220 car hire locations
Lisa Gundy IBM Corporation. Wednesday, March 12, 2014: [email protected]. 11:00 AM 12:00 PM Session 15077
Continuing the understanding of IBM Copy Services: Peer-to-Peer-Remote-Copy (PPRC) and Point in Time Copy (FlashCopy) for High Availability (HA) and Disaster Recovery (DR) Lisa Gundy IBM Corporation [email protected]
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
OnCommand Unified Manager
OnCommand Unified Manager Operations Manager Administration Guide For Use with Core Package 5.2 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1(408) 822-6000 Fax: +1(408) 822-4501
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Getting Started with Digital Certificates Part II (RACDCERT)
Getting Started with Digital Certificates Part II (RACDCERT) 1 This presentation will guide you through the RACF s world of Digital Certificates. We will attempt to explain how they can be used and how
IBM Cloud Manager with OpenStack
IBM Cloud Manager with OpenStack Download Trial Guide Cloud Solutions Team: Cloud Solutions Beta [email protected] Page 1 Table of Contents Chapter 1: Introduction...3 Development cycle release scope...3
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Dell Compellent Storage Center
Dell Compellent Storage Center Active Directory Integration Best Practices Guide Dell Compellent Technical Solutions Group January, 2013 THIS BEST PRACTICES GUIDE IS FOR INFORMATIONAL PURPOSES ONLY, AND
LDaemon. This document is provided as a step by step procedure for setting up LDaemon and common LDaemon clients.
LDaemon This document is provided as a step by step procedure for setting up LDaemon and common LDaemon clients. LDaemon... 1 What you should know before installing LDaemon:... 2 ACTIVE DIRECTORY... 2
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
