Book description
Support for a Kerberos based Network Authentication Service and the introduction of Enterprise Identity Mapping (EIM) were exciting OS/400® V5R2 announcements during 2002.
A Kerberos based Network Authentication Service enables the iSeries (and any kerberized application) to use a Kerberos ticket for authentication instead of a user ID and password. This enables you to sign on once in the morning to your Kerberos based security server and not be prompted again when accessing your enabled applications. This is called Single Signon (SSO).
Enterprise Identity Mapping (EIM) is a cross platform solution that involves a wide range of technologies including Kerberos, LDAP, and Kerberos Network Authentication Service. Basically, EIM is a framework provided by IBM that allows the mapping of authenticated users to OS/400 (and application) userids. This extends the power of SSO to the enterprise.
Because the iSeries is well known as a server that can consolidate a wide range of application programming environments into one manageable system, this IBM Redbooks publication, then, studies the implementation of Kerberos and EIM in a SCON environment that includes OS/400, Windows, and applications that are right now being updated to support the new framework. We provide easy to follow examples that demonstrate all the pieces working together.
Please note that the additional material referenced in the text is not available from IBM.
Table of contents
- Notices
- Preface
-
Part 1: Introduction to single signon and Enterprise Identity Mapping
- Chapter 1: An overview of single signon
- Chapter 2: Planning for Network Authentication Service and Enterprise Identity Mapping implementation
- Chapter 3: The redbook example scenario
-
Part 2: Building blocks for single signon and Enterprise Identity Mapping
- Chapter 4: Kerberos Network Authentication
- Chapter 5: iSeries Network Authentication Service
- Chapter 6: Enterprise Identity Mapping
-
Part 3: Installation and configuration
- Chapter 7: Enabling Network Authentication Service and Enterprise Identity Mapping
-
Chapter 8: Other scenarios
- The Bike Shop scenario (1/3)
- The Bike Shop scenario (2/3)
- The Bike Shop scenario (3/3)
- Using remote SQL with single signon
- Enabling another iSeries server for single signon (1/2)
- Enabling another iSeries server for single signon (2/2)
- Enabling NetServer for single signon (1/2)
- Enabling NetServer for single signon (2/2)
- Enabling Domino Web Access for single signon and EIM (1/4)
- Enabling Domino Web Access for single signon and EIM (2/4)
- Enabling Domino Web Access for single signon and EIM (3/4)
- Enabling Domino Web Access for single signon and EIM (4/4)
- Where to find more information
- Enabling Web Express Logon for WebSphere Host on-Demand (1/2)
- Enabling Web Express Logon for WebSphere Host on-Demand (2/2)
-
Chapter 9: Programming APIs and examples
- Java EIM API
- Java classes and interfaces
- Security in the Java classes
- Java example: ReportEIM (1/4)
- Java example: ReportEIM (2/4)
- Java example: ReportEIM (3/4)
-
Java example: ReportEIM (4/4)
- Constants
- The createAssociationTypeMap method
- The createRegistryTypeHashMap method
- The getDomain method
- The getAllDomains method
- The createDomain method
- The getRegistries method
- The createRegistries method
- The getEids method
- The createEids method
- The outputDomainInfo method
- The outputRegistryInformation method
- The outputRegistryAliasInformation method
- The outputRegistryUserInfo method
- The outputEidInfo method
- The outputStringInformation method
- The outputAssociationInfo method
- The deleteEIMDomain method
- The startReport method
- Java example: EIMAuthorities (1/2)
- Java example: EIMAuthorities (2/2)
- Kerberizing an application
- C EIM API
- C Generic Security Service (GSS) API
- EIM demo tool
-
Part 4: Appendices
- Appendix A: Backup and recovery
- Appendix B: Troubleshooting
- Appendix C: Windows 2000 Kerberos tools
- Appendix D: Planning forms
-
Appendix E: Available EIM products
- BlueNotes EIM Administration Suite (1/2)
- BlueNotes EIM Administration Suite (2/2)
- SafeStone’s AxcessIT - Automated EIM Management (1/2)
- SafeStone’s AxcessIT - Automated EIM Management (2/2)
- TriAWorks Identity Manager for Single Sign-On (1/3)
- TriAWorks Identity Manager for Single Sign-On (2/3)
- TriAWorks Identity Manager for Single Sign-On (3/3)
- Appendix F: Java code listings and output examples
- Appendix G: Additional material
- Related publications
- Index (1/2)
- Index (2/2)
- Back cover
Product information
- Title: Windows-based Single Signon and the EIM Framework on the IBM eServer iSeries Server
- Author(s):
- Release date: April 2004
- Publisher(s): IBM Redbooks
- ISBN: 9780738498997
You might also like
book
IBM PowerVM Virtualization Introduction and Configuration
This IBM® Redbooks® publication provides an introduction to PowerVM™ virtualization technologies on Power System servers. PowerVM …
book
IBM z/OS V1R12 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking
For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world’s computing …
book
WebSphere Application Server V8: Administration and Configuration Guide
This IBM® Redbooks® publication provides system administrators and developers with the knowledge to configure an IBM …
book
3174 Network Server in Frame Relay and Multiprotocol
The 3174 Establishment Controller is an important component, when acting This document describes the 3174 Establishment …