Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2010-2014  (1)
  • International Business Machines Corporation International Technical Support Organization.  (1)
  • Guth, Karl-Maria
  • Press, World Trade
  • Poughkeepsie, N.Y. : IBM Corp., International Technical Support Organization  (1)
  • Computers ; Access control ; Passwords  (1)
Datasource
Material
Language
Years
  • 2010-2014  (1)
Year
Author, Corporation
  • International Business Machines Corporation International Technical Support Organization.  (1)
  • Guth, Karl-Maria
  • Press, World Trade
  • Bücker, Axel  (1)
Publisher
  • Poughkeepsie, N.Y. : IBM Corp., International Technical Support Organization  (1)
  • 1
    Online Resource
    Online Resource
    Poughkeepsie, N.Y. : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 3rd ed.
    Series Statement: IBM redbooks
    Keywords: Computer networks ; Security measures ; Computers ; Access control ; Passwords ; Electronic books ; Electronic books ; local
    Abstract: Everyone feels the pain of too many passwords to remember. Everyone can relate to the security exposure of weak passwords, chosen for convenience. And, everyone can relate to passwords placed in proximity to the workstation for a quick reminder. Unfortunately, that note can allow more than the intended user into the system and network. The average user today often has four or more passwords. And, security policies that focus on password complexity and password-change frequency can cause even more difficulty for users. This IBM® Redbooks® publication introduces IBM Security Access Manager for Enterprise Single Sign-On 8.2, which provides single sign-on to many applications, without a lengthy and complex implementation effort. Whether you are deploying strong authentication, implementing an enterprise-wide identity management initiative, or simply focusing on the sign-on challenges of a specific group of users, this solution can deliver the efficiencies and security that come with a well-crafted and comprehensive single sign-on solution. This book is a valuable resource for security officers, administrators, and architects who want to understand and implement an identity management solution in a medium-scale environment. This book is an update to the existing SG24-7350-01.
    Note: Number on resource description page: SG24-7350-02. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed Feb. 4, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...