This information explains how to configure everything you need to implement a single signon environment in your enterprise.
Creating a single signon environment is a matter of appropriately configuring Enterprise Identity Mapping (EIM) and a compatible authentication method to work together in such a way that the combined configuration provides a true single signon environment. In the case of the i5/OS™ single signon solutions, the authentication method is network authentication service (Kerberos).
Because a single signon environment can be complex to configure, you may find it useful to create a test environment before you implement single signon across your enterprise. The Scenario: Create a test single signon environment demonstrates how to configure such a test environment so that you can learn more about the planning needs of implementing single signon as well as gain a better understanding of how an single signon environment can work for you.
After you work with a test environment, you can use what you learn to plan how to implement single signon on a larger scale in your enterprise. You may find it useful to work through the Scenario: Enable single signon for i5/OS to learn about the more advanced configuration options that you can employ when you implement an single signon environment.
Once you have reviewed these and the other single signon scenarios, you can use the Single signon planning worksheets to create an informed single signon implementation plan that fits the needs of your enterprise. With these planning worksheets in hand, you are ready to continue with the configuration process.
This information helps you configure a single signon environment using the network authentication service as your authentication method and using EIM to create and manage your user profiles and identity mappings. Because single signon involves a number of detailed configuration steps, this information describes the high-level configuration tasks for single signon and provides links to the more detailed configuration information for both EIM and network authentication service where appropriate.