A SERVICE OF

logo

*
W.v) b] Nu(network-based authentication). gkZ
G IP(Internet Protocol) VR& YA8N @j'. W<:& &
nOB POP(Protected Object Policy). POP(Protect Object
Policy) |6
Y
Y_ dR Nu(multi-factor authentication). gkZ! N 3
LsGNu 9'; gkO) NuO5O -& G`OB
POP(Protected Object Policy). 9& in, 8# Zx! kQ W
<: &n!- gkZB gkZL'/O#M gkZL'/d+ O
# ZeQYN NuX_ UOY. POP(Protected Object Policy)
|6
\h0 Nu(step-up authentication). g| 8:H Nu 9'
h~ 86! G8Og, ZxG policy <.! {s /$ 9'G
Nu; -& G`OB POP(Protected Object Policy). \h0 N
u POP& gkOi gkZ! Vnx Zx! W<:Ob 'X )
/9'GNu; gkOv JF5Gv8, gkZ! VRQ Z
x; 8#OB policy!- d8OB 9'!- NuX_ UOY.
L[ gN B(SSO: Single Signon). gkZ! Q x NWB
Oi ""G nC.ILG! 30{8NNWBOv Jm5 )/
nC.ILG! W<:R v VB bI.
[Nz gN B
(GSO:
Global Signon) |6
5^NL'(domain name). NM] ANd]:!- #:. C
:[GL'. 5^NL': P..ZN 8PGB OCG O'L
'8N 8:KOY. 9& in, #:. C:[G O|Q 5^N
L'(FQDN)L as400.rchland.vnet.ibm.comO fl, Y=: "
" 5^NL'TOY. as400.rchland.vnet.ibm.com,
vnet.ibm.com, ibm.com
5^N(domain). (1) xk -q:& x/Og 8k xkGB q
{8N bIOB gkZ, C:[ W ZxG m. Wl-. (2) %
LM 3. ZxL xk &n O! VB C:[ W.v) NP.
5^NL'
(domain name) |6
p:d. :06(directory schema). p:d.! *8/ v V
B CY% S: /| W @j'. ,!:. S: /| W @j'
. ,!:B S: * 8.(9& in, n2 S:L 8gX_ O
Bv, W.m p:d.! kX n2 S:L 8gR v VBv);
$GUOY.
pU(daemon). ,S GB Vb{8N C:[ |'G bI(9:
W.v) &n); v`Ob 'X +N8N G`GB ANW%. O
N pU: Xg B:)& v`Ob 'X Z?8N ..EGm, *
Sv pU: $b{8N [?UOY.
pvP -m(digital signature). e-commerce!- %LM \'
! _!GE* %LM \'G O# |[! XgOB %LMN, %
LM \' vEZ! \'G +a: W R:& .NOm '6 !
I:;NDR v VT UOY.
s
slCDO(routing file). ^Cv 8:; &nOB mI; w
TOB ASCII DO
18S(run time). C:[ ANW%; G`OB C#. 18S /
f: G` /fTOY.
9v:..(registry). gkZ, C:[ W RA.~n! kQ W
<: W 8: $8& wTOB %LM zeR
j(rule). L%. -v! L%. #G |h(L%. s|)& ND
Om L! {s Z? @d; G`R v V5O OB O* Ls
G m.mI.
6
6LW9LG(migration). L| v| GB 1.:& YYb '
XANW%G u v| GB 1.:& 3!OB M
^8%LM(metadata). zeH%LMG /:; 3mOB %L
M
Y
YNe(bind). ID& ANW% ;G Y% @j'.M |C~B
M. 9& in,ID& *, VR GBY% IDM |C~E*, |D
{N E3/v W G& E3/vM,|~B M
8H |.(security management). 6wG :x! _dQ %
LM W nC.ILGG W<:& &nOb 'Q 6wG IB;
v$OB |. T"
8# vX(quality of protection). Nu, +a: W AsLv
C 6G 6U8N G0GB %LM 8H vX
8# @j'. x#(protected object space). ACL W POP
& {kOb 'X gkOg gkZ W<: GQ N)! gkO
76 IBM Tivoli Access Manager for e-business: BEA WebLogic Server kU H;-