Server User Manual

b 'X gkOB AN<:.
Y_ dR Nu
,
W.v) b] N
u
(authentication) W
\h0 Nu
(authentication) |6
N8L2U. -q:(entitlement service). A0C^ GB 6G
<.G \N R:NNM N8L2U.&.OOb 'X gkR v
VB GQ API 18S C/WN. N8L2U.B 8k /$ f
D8N Zx |.Z nC.ILG!-RqOE**_! GQA
N<:!- gkOb 'XA0C^G GQ $8! _!R nC
.ILG /$ %LMTOY. m4: GQ ADK& gkO) L
/Q -q:& 3_R v V@OY.
N8L2U.(entitlement). \N-H 8H policy $8& wT
OB %LM 86. GQ!B /$ nC.ILG8N LXR v V
B fD8N |D-H bI GB policy %LM! V@OY.
NM] ANd]:(Internet suite of protocols). NM]!-
gkOb 'X 3_Gn IETF(Internet Engineering Task Force)
& kX RFC(Requests for Comment)N x3H ANd] <.
Z
Z? 3!(silent installation). ^Cv& \V! 8;v Jv8
kE NW DO! ^CvM@y& zeOB 3!. GQ Z? 3
!!-B %LM TB;'X @d DO; gkR v V@OY.
@d DO
(response file) |6
Zx@j'.(resource object). G& W.v) Zx(9: -q
:, DO W ANW%)G %C
Z< nO(self-registration). gkZ! JdQ %LM& TBR
v Vm|.ZG |) xL nOH Tivoli Access Manager g
kZ! I v VB AN<:
"Ln(suffix). NCN 8/OB p:d. h~ 86!- G '
Wq; D0OB 80 L'. LDAP(Lightweight Directory
Access Protocol)!- gkGB sk{L'v$ fD8N NX,
L "LnB p:d. h~ 86 ;G Y%pg Wq! {kK
OY. p:d. -v!B NCN 8/GB p:d. h~ 86 "
"; D0OB )/ 3G "Ln! V; v V@OY.
6!(action). ACL(Access Control List) GQ S:.
ACL(Access Control List) |6
+
AWLJ @j'.(container object). @j'. x#; 05G
bI region! 8:OB 86{ v$
m0(cookie). -v! ,sLp. C:[! zeOm DS<G
!- W<:OB $8. m0B -v! ,sLp.! kQ /$$
8& boR v VT UOY.
)b 6$ !I(scalability). Zx! W<:OB gkZ vG u
!! @dOb 'Q W.v) C:[ bI
0 %LM#L: DO(key database file).
0 5
(key ring) |
6
0 5(key ring). C:[ 8H!- xk 0, 3Nk 0, EZ:
VB g. W Nu; wTOB DO
0 V(key pair). C:[ 8H!- xk 0 W 3Nk 0. O
#-! 0 V; gkR ', [EZB xk 0& gkO) ^C
v& O#-Om, vEZB 3Nk 0& gkO) ^Cv& O#
X6UOY. -m! 0 V; gkR ', -mZB 3Nk 0& g
kO) ^Cv %C& O#-Om, vEZB xk 0& gkO)
-m .N; 'X ^Cv %C& O# X6UOY.
0 DO(key file).
0 5
(key ring) |6
0(key). C:[ 8H!- %LM O#- W O# X6;'X
O#- Km.r!- gkOB OCG b#.
3Nk 0
(private
key) W
xk 0
(public key) |6
8
d+(token). (1) YE. kEA!- :WLGLSCN |[ E
< &n O! V=; %COb 'X %LM :WLG #!,S
{8N |^GB GQ b#. ""G %LM :WLG!B E<&
&nOb 'X d+; 9fOm gkR b8! V@OY. d+:
|[ GQ; K.B /$ ^Cv GB q.POTOY. (2) Y
E. kEA(LAN)!- |[ E<M T2 pYL: #! |^G
B q. Cv:. d+! %LM! _!H fl, L d+: A9
SL KOY.
D
wP(portal). /$ gkZG W<: GQ; b]8N, /$ g
kZ! gk !IQ %Zx(9: 5), ;k GB -q:)G g
kZ $G qO; ?{8N [:OB kU % gL.
z5(polling). %LMG|[ )N& a$Ob 'X %LM#L
:& $b{8N 6gOB AN<:
78 IBM Tivoli Access Manager for e-business: BEA WebLogic Server kU H;-