Parag Gokhale has just published a new how-to guide on customizing the IBM Security Identity Manger virtual appliance which will be useful to just about every ISIM administrator.
The IBM Security Identity Manager (ISIM) virtual appliance significantly reduces the complexity in installing and configuring the ISIM environment, including the operating system, middleware, and the ISIM application itself. However, with this simplification, comes some changes in the way ISIM administrators and consultants can customize and extend the ISIM environment, compared to previous software stack installations of ISIM. This document describes supported approaches for developing and maintaining ISIM ex extensions or customization.
In this demo
You might also be interested in....
Protect your critical assets with an integrated, cost-effective approach to vulnerability assessments and risk management.
Read this white paper to learn:
Download "Managing security risks and vulnerabilities."
I'm pleased to announce that Dinesh Jain has just published "Del
From the white paper's introduction:
Organizations that work with several business partners, vendors, and contractors need a delegated user administration model for identity management tasks for the following reasons:
This paper provides in-depth details about implementing delegated administration of identity management tasks for a business partner organization with IBM Security Identity Manager.