EasyManuals Logo

IBM eserver i5 User Manual

IBM eserver i5
940 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #554 background imageLoading...
Page #554 background image
5486OpS.fm Draft Document for Review October 18, 2004
520 IBM Eserver i5 and iSeries System Handbook
EIM allows the creation of a system of identity mappings called associations,
between the various user identities in various user registries for a person in
your enterprise. It also provides a common set of APIs. They can be used to
develop applications that use these identity mappings to look up the
relationships between user identities across platforms.
In conjunction with network authentication service, the i5/OS and OS/400
implementation of Kerberos, EIM provides an SSO environment that is
managed and configured though iSeries Navigator.
򐂰 Network Authentication Service
Network Authentication Service allows the iSeries server and several iSeries
services, such as iSeries Access for Windows, to use a Kerberos ticket as an
optional replacement for a user name and password for authentication. The
Kerberos protocol, developed by Massachusetts Institute of Technology (MIT),
allows a principal (a user or service) to prove its identity to another service
within an unsecure network. Authentication of principals is completed through
a centralized server called a Kerberos server or key distribution center (KDC).
򐂰 Virtual private networking
VPN allows a company to extend its private intranet securely over the existing
framework of a public network, such as the Internet. It controls network traffic
while providing important security features such as authentication and data
privacy.
i5/OS and OS/400
VPN is an optionally-installable component of iSeries
Navigator. It allows the creation of a secure end-to-end path between any
combination of host and gateway. i5/OS and OS/400 VPN uses authentication
methods, encryption algorithms, and other precautions to ensure that data
sent between the two endpoints of its connection remains secure.
򐂰 IP filtering and Network Address Translation (NAT)
IP filtering and NAT act as a firewall to protect internal network from intruders.
With IP filtering, IP traffic is controlled by filtering packets according to rules
that are user-defined. NAT allows the hiding of unregistered private IP
addresses behind a set of registered IP addresses. This serves to protect
internal networks from outside networks. NAT also alleviates the IP address
depletion problem, since many private addresses can be represented by a
small set of registered addresses.

Table of Contents

Other manuals for IBM eserver i5

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the IBM eserver i5 and is the answer not in the manual?

IBM eserver i5 Specifications

General IconGeneral
BrandIBM
Modeleserver i5
CategoryServer
LanguageEnglish

Related product manuals