|Configuring global security in WebSphere Lombardi Edition V7.2 using Tivoli
Directory Server V6.3
Learn how to configure global security in IBM WebSphere Lombardi Edition V7.2 using an LDAP server. This helps enterprise users to log in and use the various applications in Lombardi Edition and allows the IT department better access control. This tutorial uses IBM Tivoli Directory Server V6.3 as the LDAP server and IBM DB2 as the database.
|26 Jan 2011|
|Using the LDAP wrapper with InfoSphere Federation Server
The LDAP wrapper is a pure Java package that is based on InfoSphere Federation Server Java wrapper SDK technology. By providing read-only access to LDAP directory servers in an SQL environment, the LDAP wrapper facilitates the integration and connectivity between business data in a relational database and human resource data in the LDAP directory server.
|23 Sep 2010|
|Bulk attestation within Tivoli Identity Manager
As part of compliance requirements, organizations are required to perform attestation of a user's entitlements for access to systems. This process usually requires a responsible party (for example, the user's manager) to assert that the user continues to require access to a particular system. IBM Tivoli Identity Manager (ITIM) provides account attestation as part of its core functionality, and hence can implement complex attestation requirements. However, setting the attestation for a large number of target systems can be a chore. In addition, when a responsible party is asked to perform attestation for many users of a system as part of a continuous attestation cycle, the task becomes laborious. This tutorial gives the reader some methods for scaling attestation from a manageability perspective, using features available within ITIM 5.0.
|04 Mar 2008|
|Using the IBM Tivoli Storage Manager Backup-Archive client in cluster
environments on UNIX and Linux
||18 Jul 2007|
|Deploy Red Hat across multiple computers using Tivoli Provisioning Manager for
Any time you have employees, overhead costs are going to be substantial, especially when it comes to new hires. Of the many things new employees need, setting up their computer and its operating system, and installing and configuring appropriate applications is one of the most time-consuming. Tivoli Provisioning Manager for OS Deployment greatly reduces this overhead by allowing you to create and manage deployable images and any associated software packages efficiently through a Web interface. This tutorial shows you how to use Tivoli Provisioning Manager for OS Deployment to create installation images and manage packages for an actual deployment of RedHat Enterprise Linux.
|22 May 2007|
|Setting up a secure Tivoli Access Manager Session Management Server environment
This tutorial enables secure communication between all components within a Session Management Server (SMS) environment. This is essential in any SMS deployment, because without secure communication between all components of an SMS environment, anyone could inject false session data. This tutorial describes how to achieve security-rich communication using Tivoli Access Manager (TAM) certificates and custom certificates. The order of the tutorial gives the student an easy process for working from a simple to a complex configuration.
|14 Dec 2006|
|Create a WSDM interface for an HTTP server using Apache Muse
Learn how you can use Apache Muse to create a WS-DistributedManagement (WSDM)-compliant interface for a manageable resource. In this tutorial, you'll see how to design the Web service interface for the resource, generate code for the implementation, and deploy the code as a Web application. The manageable resource focus of this tutorial is the ubiquitous Apache HTTP Server, commonly-referred to as "httpd." After completing this tutorial, you should have a Muse-based application that lets any WSDM-compliant management client manipulate the httpd resource.
Also available in: Japanese
|21 Nov 2006|
|Hit the ground running with AIDE, Part 1: Building a touchpoint
This tutorial, the first in a series on the IBM Autonomic Integrated Development Environment (AIDE), shows how you can get up and running quickly with the IBM AIDE toolkit. Discover touchpoint creation, modification, and deployment and learn about the internals of the touchpoint in relation to the underlying model.
|18 Apr 2006|
|On demand provisioning of portal servers in a clustered environment, Part 5: Run the solution
This series focuses on how the Advanced Design and Technology team uses IBM Tivoli automation products for rapid deployment of replicated and clustered portal servers. This tutorial, which is the final installment in the series, explains how to use the Portal Provisioning Automation Package and run the team's solution. It covers how to assign server roles, staging strategies for portal servers, using Tivoli Intelligent Orchestrator (Intelligent Orchestrator) to add or remove servers from the portal cluster, and migrating the automation package to Intelligent Orchestrator V3.1. Finally, you'll leave with a few thoughts about how to use the workflows to automate the deployment of other software components.
|07 Mar 2006|
|Create autonomic computing policies using Simplified Policy Language
Simplified Policy Language (SPL) is a syntax for developing autonomic computing policies that can be understood by humans. Policy authoring without proper tools can be difficult because it requires a thorough knowledge of Extensible Markup Language (XML). SPL comes to the rescue by providing an easy syntax for creating policies. Streamline and simplify your policy creation with the Policy Management tool PMAC, which is downloadable from alphaWorks, so that you can experiment with creating policies. Administrators responsible for creating and maintaining the policies for an organization will benefit the most from this tutorial.
|14 Feb 2006|
|Streamline Common Base Event logging
Common Base Event logging provides problem-determination data rich in activity and control-flow information that the Log and Trace Analyzer uses to accelerate problem determination and increase system serviceability and quality. This tutorial shows how to streamline Common Base Event logging instrumentation in the Java programming language to reduce complexity and instrumentation code size. You'll learn techniques and best practices that reduce maintenance requirements and let you increase customized, vendor-specific content.
|03 Jan 2006|
|Use Policy Management for Autonomic Computing
This tutorial shows how to use the Policy Management for Autonomic Computing (PMAC) tool, downloadable from alphaWorks, to prepare an application to receive policy guidance. This tutorial has been updated to match the Policy Management for Autonomic Computing Version 1.2.1.
|01 Jan 2006|
|Problem determination made easy, Part 1: Configure the Generic Log Adapter and Autonomic Management Engine for Web services
Learn how to combine the Autonomic Management Engine (AME) and Generic Log Adapter (GLA) to perform problem determination in a real world example using IBM WebSphere Application Server V5 and IBM DB2 8.1. This tutorial shows how to develop, install, and configure AME and GLA for using Web services, which let you send Common Base Events asynchronously. It also has an overview of the new Common Manageability Model (CMM)-based resource models, and how to develop one using the Resource Model Builder.
|06 Dec 2005|
|Developing a Faces JSR 168 portlet using IBM Rational Application Developer 6.0 for autonomic computing
This tutorial guides you through the process of developing a simple Java Specification Request (JSR) 168 portlet using IBM Rational Application Developer 6.0. It includes detailed instructions on building portlet user interfaces (UI), creating data JavaBeans, binding the data, handling the interactions, using resource bundles, and exporting the portlet to the Integrated Solutions Console. The Integrated Solutions Console is a component inside of the IBM Autonomic Computing Toolkit, which you can download at no charge.
|11 Oct 2005|
|Policy Management for Autonomic Computing: Solving a business problem using PMAC
Businesses of all types have policies that dictate the behavior of their IT resources, human resources, business rules, and so on. Policy Management for Autonomic Computing (PMAC) provides a mechanism and environment for creating and enforcing policies and automating these business scenarios. By using PMAC in this manner, your business will run more efficiently and with less process errors.
|20 Sep 2005|
|Learn how to use the Generic Log Adapter for formatting events from within your programs
The Generic Log Adapter can be looked at as a set of JAR files or libraries that can be called from within your code to perform continuous or one time conversion of native logs into the Common Base Event format. This tutorial will explain how you can invoke the Generic Log Adapter in such a manner and capture the output back into your code. In addition, it will guide in making dynamic reconfigurations of the GLA engine at runtime which expands the scope of use of the GLA within your own programs.
|13 Sep 2005|
|Policy Management for Autonomic Computing: Write a complete XML policy using Policy Management for Autonomic Computing
The crux of an IT Administrator's job is to be able to control the behavior of managed resources. By using policy documents in concert with the Policy Management for Autonomic Computing (PMAC) component, the IT professional is able to manage resources quickly and efficiently.
|06 Sep 2005|
|Configure network quality of service to manage application performance through service level agreements on z/OS
This tutorial shows how to manage application performance using the Policy Based Network Quality of Service (PBN QoS) and the network QoS Service Level Agreement (SLA) data collection functions on z/OS. TheQoS SLA data collection function is available in IBM Communications Server for z/OS V1R5. This solution uses the autonomic control loop, which is made up of four functions: monitoring, analyzing, planning, and executing.
|19 Jul 2005|
|Using the ACPolicy API
This tutorial shows how to use the Policy Management for Autonomic Computing (PMAC) ACPolicy application programming interface (API) , downloadable from alphaWorks, to create, change, and validate an autonomic policy document.
|21 Jun 2005|
|Using the Managed Element Descriptor API
This tutorial shows how to use the Policy Management for Autonomic Computing (PMAC) Managed Element Descriptor (MED) application programming interface (API), downloadable from alphaWorks, to gather the desired data from a managed resource to aid in the enforcement of autonomic policy.
|31 May 2005|
|Globalizing an Integrated Solutions Console portal application
The world of autonomic computing is a global world. Developers need to be ever conscious of global issues in designing user interfaces and in making their applications available to the international marketplace. The Integrated Solutions Console enables the common systems administration feature of autonomic computing. Internationalizing one's portlet application opens up common systems administration to administrators not just around the country but around the world.
|15 Mar 2005|
|Autonomic Computing Expression Language
This tutorial shows how to use Autonomic Computing Expression Language (ACEL) in your XML document. It takes a user step-by-step through the process of creating an XML document with ACEL expressions, parsing the XML document, and evaluating ACEL expressions contained in the XML document.
|28 Feb 2005|
|Debugging Tivoli UNIX resource models
This tutorial provides a step-by-step example of how to debug an IBM Tivoli Monitoring (ITM) resource model using the Resource Model Builder Debugger for UNIX. It guides you through the process of finding and fixing an ITM resource model with a simple logic error.
|10 Sep 2004|
|Model your data center
This tutorial provides an overview of IBM Tivoli Intelligent ThinkDynamic Orchestrator and describes the data center model, a virtual model of your data center. This tutorial introduces you to the product, along with some of the end-to-end concepts and the relationships that exist within the data center. You'll see two different ways to set up a data center model with Tivoli Intelligent ThinkDynamic Orchestrator: by using the graphical interface, and by importing structured XML documents.
|08 Jun 2004|
|ITM resource model creation
IBM Tivoli Monitoring (ITM) is a powerful environment that gives you the ability to monitor virtually any type of resource. This tutorial shows you how easily you can build custom monitoring capabilities into ITM using the ITM Resource Model Builder. Resource Models provide a structured environment to provide resource status analysis, notification of significant events, and even automatic corrective measures. ITM Resource Model Builder is an IDE that simplifies the process of creating and debugging Resource Models.
|22 Sep 2003|
|User provisioning with Tivoli Identity Manager
The process of creating user accounts and permissions for employees on a diverse array of computers can potentially consume much of an IT department's time and resources. In this tutorial, you'll learn how IBM Tivoli Identity Manager, working in conjunction with other Tivoli products, can help streamline the user provisioning process. You'll build a sample application that automatically creates user accounts with appropriate permissions based on data entered into a human resources database. The resulting environment also helps the establishment of single sign-on authentication for the newly provisioned users.
|12 Sep 2003|
|Installing Tivoli Access Manager on Linux
Linux is quickly becoming a dominant platform for e-business and enterprise applications. The recent release of IBM Tivoli Access Manager 4.1 Fixpack 2 recognized this fact by adding support for Linux on the Intel platform. In this tutorial, you'll learn how to install and configure IBM Tivoli Access Manager 4.1 on Linux. You'll also walk through some simple steps that will test your installation, including the creation of a WebSEAL junction.
|08 Aug 2003|
|Secure your Web resources
This tutorial drives through three WebSphere Application Server/Tivoli Access Manager integration scenarios. You'll learn how to share the user registry, and to protect Web resources with WebSEAL via both LTAP and TAI. Setup and configuration details are provided for testing and configuring all the scenarios in the tutorial.
|29 May 2003|
|Real-time Web site data collection
Do you have a high-traffic Web site and need to analyze the viewing habits of your visitors? You may have noticed that it is difficult to keep up with data volume and need more timely access to data than you can get by using logs and batch processing. In this tutorial, you'll learn how to implement a dynamic page-level data capture method using Tivoli Web Site Analyzer's Web Tracker. Web Tracker collects data in real time from visitors as they use a Web site and returns it to the database for immediate processing. This method allows you to gather information on Web site visitor behavior and the client (browser) environment which is not available through standard Web log processing.
|06 May 2003|
|Toughen Web application security
Carelessly chosen passwords have made many password-protected systems vulnerable to outside attack. This tutorial shows you how you can use Tivoli Access Manager WebSEAL to build a multiphased authentication system that locks Web applications down more tightly. The tutorial includes sample C code that you can use as a basis for your own applications.
|01 May 2003|
|Secure your Web server
Secure a Web server against unauthorized access. This tutorial covers physical security, the importance of firewalls, correct application installation, file permissions, application configuration, and techniques that allow Web page maintainers to do their job without sacrificing system integrity.
|23 Jul 2002|
|General computer security
Get an overview of the security process surrounding computer systems.
|12 Dec 2000|