ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzahg_5.4.0.1/rzahgebsecurity.htm

23 lines
1.9 KiB
HTML

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Copyright" content="Copyright (c) 2006 by IBM Corporation">
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights - -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<title>Security and Directory Server</title>
<link rel="stylesheet" type="text/css" href="ic.css">
</head>
<body>
<script type="text/javascript" language="Javascript" src="synch.js"></script>
<h1>e-business and Web serving:<br>Security and Directory Server</h1>
<p>Read this information to understand e-business security and Directory Server offerings.</p>
<p style="margin-left:50px;"><strong><a href="../rzahy/rzahyrzahywelpo.htm">Directory Server (LDAP)</a></strong><br>Configure, administer, and troubleshoot Directory Server. Directory Server provides a Lightweight Directory Access Protocol (LDAP) server.</P>
<p style="margin-left:50px;"><strong><a href="../rzalv/rzalvmst.htm">Enterprise Identity Mapping</a></strong><br>Find information on how to configure, manage, and use Enterprise Identity Mapping (EIM), a technology for mapping identities within an enterprise. You can use EIM to create one-to-one mappings between individual user identities or for creating many-to-one mappings between a group of user identities in one user registry and a single user identity in another user registry. EIM also provides a common set of APIs for use across platforms in developing applications that can use the identity mappings. In addition, you can use EIM in conjunction with network authentication service, the i5/OS<sup>(TM)</sup> implementation of Kerberos, to provide a <a href="../rzamz/rzamzsso.htm">single signon environment</a>.</P>
</body></html>