91 lines
7.1 KiB
HTML
91 lines
7.1 KiB
HTML
|
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
|
||
|
<HTML>
|
||
|
<HEAD>
|
||
|
<META http-equiv="Content-Type" content="text/html; charset=utf-8">
|
||
|
<meta name="Copyright" content="Copyright (c) 2002 by IBM Corporation">
|
||
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
||
|
<!-- US Government Users Restricted Rights -->
|
||
|
<!-- Use, duplication or disclosure restricted by -->
|
||
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
||
|
<link rel="stylesheet" type="text/css" href="ic.css">
|
||
|
<TITLE>Security</title>
|
||
|
</HEAD>
|
||
|
<BODY>
|
||
|
<!-- Java sync-link -->
|
||
|
<script language="Javascript" src="synch.js" type="text/javascript">
|
||
|
</SCRIPT>
|
||
|
|
||
|
<H2>Security</H2>
|
||
|
|
||
|
<p>These topics help you secure your server. You can find information about securing applications, communications, servers, and your network.</p>
|
||
|
<blockquote>
|
||
|
<p><a href="../rzajc/rzajcoverview.htm"><strong>Cryptographic hardware</strong></a><br>
|
||
|
The cryptographic hardware adds highly secure cryptographic processing capability
|
||
|
to your server. It also includes encryption and digital signatures.</p>
|
||
|
<p><a href="../rzahu/rzahurazhudigitalcertmngmnt.htm"><strong>Digital Certificate
|
||
|
Manager</strong></a><br>
|
||
|
Find information about using digital certificates and the Secure Sockets Layer
|
||
|
(SSL) to enable secure communications for many applications. With Digital
|
||
|
Certificate Manager, a feature for OS/400<SUP>(R)</SUP>, you can manage digital
|
||
|
certificates for your network.</p>
|
||
|
<p><a href="../rzalv/rzalvmst.htm"><strong>Enterprise Identity Mapping (EIM)</strong></a><br>
|
||
|
Find information on how to configure, manage, and use Enterprise Identity Mapping (EIM), a technology for mapping identities within an enterprise. You can use EIM to create one-to-one mappings between individual user identities or for creating many-to-one mappings between a group of user identities in one user registry and a single user identity in another user registry. EIM also provides a common set of APIs that can be used across platforms to develop applications that can use the identity mappings that you create to look up the relationships between user identities. In addition, you can use EIM in conjunction with network authentication service, the OS/400(R) implementation of Kerberos, to provide a single signon environment. </p>
|
||
|
<p><a href="../rzaj4/rzaj4secoverview.htm"><strong>iSeries and Internet Security</strong></a><br>
|
||
|
Find overview information about Internet security risks and server solutions
|
||
|
for combating these risks. You can apply common Internet-use scenarios to
|
||
|
your own Internet situation.</p>
|
||
|
<p><a href="../rzajb/rzajbrzajb0ippacketsecuritysd.htm"><strong>IP filtering and
|
||
|
network address translation</strong></a><br>
|
||
|
Find information that you need to use the packet rules function to control
|
||
|
and monitor TCP/IP traffic into and out of your server. If you are connecting
|
||
|
to any network and want to protect your server from unwanted attacks and intrusion,
|
||
|
come here to find the answers you need. Also, use NAT to hide private IP addresses
|
||
|
behind a registered, public IP address.</p>
|
||
|
<p><a href="../books/sc415302.pdf"><strong>iSeries Security Reference</strong></a><img src="../images/wbpdf.gif" alt="Link to PDF" width="19" height="17"><br>
|
||
|
This manual provides information about planning, setting up, managing, and
|
||
|
auditing security on your server. It describes all the features of security
|
||
|
on the server and discusses how security features relate to other aspects
|
||
|
of the server, such as work management, backup and recovery, and application
|
||
|
design.</p>
|
||
|
<p><a href="../rzakh/rzakh000.htm"><strong>Network authentication service</strong></a><br>
|
||
|
Learn how to configure network authentication service on your server. With
|
||
|
network authentication service, you can configure your server to participate
|
||
|
in a Kerberos network. Also when network authentication is used with Enterprise
|
||
|
Identity Mapping (EIM), it provides administrators with a way to enable a
|
||
|
single signon environment in their networks.</p>
|
||
|
<p><a href="../rzalz/rzalzosintro.htm"><strong>Object signing and signature verification</strong></a><br>
|
||
|
Find information about OS/400 object signing and signature verification security capabilities that you can use to ensure the integrity of objects. Learn how to use one of several OS/400 methods for creating digital signatures on objects to identify the source of the object and provide a means for detecting changes to the object. Also learn how to enhance system security by verifying digital signatures on objects, including operating system objects, to determine whether there have been changes to the contents of the object since it was signed.</p>
|
||
|
<p><a href="../rzain/rzainoverview.htm"><strong>Secure Sockets Layer (SSL)</strong></a><br>
|
||
|
Configure Secure Sockets Layer (SSL) to secure communications for many popular
|
||
|
applications, such as iSeries<SUP>(TM)</SUP> Access, Telnet, IBM<SUP>(R)</SUP>
|
||
|
HTTP Server for iSeries, and others.</p>
|
||
|
<p><a href="../rzalx/rzalxsecterms.htm"><strong>Security terminology</strong></a><br>
|
||
|
Find definitions and descriptions of commonly used security terms.</p>
|
||
|
<p><a href="../rzamh/rzamh1.htm"><strong>Service tools user IDs and passwords</strong></a><br>
|
||
|
Service tools can be accessed from dedicated service tools (DST) or system service tools (SST). Service tools user IDs and passwords are required to access DST, SST, and to use some iSeries Navigator functions.</p>
|
||
|
|
||
|
<p><a href="../rzamz/rzamzsso.htm"><strong>Single signon</strong></a><br>
|
||
|
Single signon as implemented in OS/400 provides an environment in which a
|
||
|
user only needs to know and manage their Windows domain user identity and
|
||
|
password. Single signon uses network authentication service for authentication
|
||
|
and Enterprise Identity Mapping (EIM) to map from one user identity to another
|
||
|
user identity; for example, you can map from an authenticated Windows user
|
||
|
identity to an approriate OS/400 user profile for authorization purposes.
|
||
|
Using single signon allows you to reduce the number of times that a user is
|
||
|
prompted for information to sign-on, as well as to eliminate the user's passwords
|
||
|
in OS/400. For an administrator, this approach significantly reduces the time
|
||
|
and cost of managing passwords. For application developers, using this approach
|
||
|
to single sign-on eliminates the need to implement application specific user
|
||
|
registries and application specific authorization mechanisms.</p>
|
||
|
<p><a href="../rzaja/rzajagetstart.htm"><strong>Virtual private networking</strong></a><br>
|
||
|
Find information on how to set up a virtual private network (VPN), which allows
|
||
|
your company to securely extend its private intranet over a public network,
|
||
|
such as the Internet.</p>
|
||
|
|
||
|
<p><a href="rzahgsecuritysecuritymans.htm"><strong>Related information</strong></a><br>
|
||
|
The following references complement the existing security information in the
|
||
|
Information Center. This information contains technical, know-how, and "how-to"
|
||
|
information.</p>
|
||
|
</blockquote>
|
||
|
</body></html>
|