TY - BOOK AU - Ramanujam,Vinodha AU - Braswell,Byron TI - IBM websphere V5 : : edge of network patterns / T2 - Redbooks SN - 0738427926 PY - 2003/// CY - North Castle : PB - IBM, KW - WEBSPHERE KW - INGENIERIA DEL SOFTWARE KW - ENTORNO DE DESARROLLO DE SOFTWARE KW - PATTERNS KW - WEBSPHERE V5 KW - SOFTWARE DE APLICACION N1 - CONTENIDO Part 1: Introduction to Patterns Chapter 1. Patterns for e-business Section 1.1. The Patterns for e-business layered asset model Section 1.2. How to use the Patterns for e-business Section 1.3. Summary Chapter 2. Edge of network Runtime patterns for authorization and authentication Section 2.1. Edge of network authorization and authentication Section 2.2. The need for authorization and authentication Section 2.3. Runtime node types and tiers Section 2.4. Runtime patterns for authorization and authorization Part 2: Runtime patterns: technology guidelines Chapter 3. Tivoli Access Manager technology guidelines Section 3.1. Tivoli Access Manager for e-business Section 3.2. Web server security characteristics Section 3.3. Tivoli Access Manager overview Section 3.4. Tivoli Access Manager base components Section 3.5. Tivoli Access Manager Blades Section 3.6. Access control of Web content and applications Section 3.7. Basic architectural principles Section 3.8. Tivoli Access Manager component interactions Section 3.9. Component configuration and placement Chapter 4. Edge Components technology guidelines Section 4.1. WebSphere Application Server Edge Components Section 4.2. Caching Proxy Section 4.3. Load Balancer Part 3: Guidelines Chapter 5. Common installation and configuration guidelines Section 5.1. Common installation topics Section 5.2. IBM Directory Server V4.1 on Windows 2000 Section 5.3. Tivoli Access Manager V4.1 on Windows 2000 Section 5.4. Caching Proxy V5 on Windows 2000 Section 5.5. Tivoli Access Manager Plug-in on Windows 2000 Section 5.6. IBM Directory Server 4.1 on AIX 4.3.3 Section 5.7. Tivoli Access Manager V4.1 on AIX 4.3.3 Section 5.8. Caching Proxy V5 for AIX V4.3.3 Section 5.9. Tivoli Access Manager Plug-in on AIX 4.3.3 Section 5.10. Administration of the Caching Proxy and plug-in Chapter 6. Sample authentication and authorization environment Section 6.1. Sample scenario environment Section 6.2. Access Manager Plug-in files and tools Section 6.3. Sample scenario ER -