348
IBM Tivoli Access Manager Base Installation Guide Version 5.1 SC32-1362-00

Base Installation Guidepublib.boulder.ibm.com/.../en_US/PDF/am51_install.pdf · 2005-04-12 · IBM Tivoli Access Manager Base Installation Guide Version 5.1 SC32-1362-00

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

  • IBM

    Tivoli

    Access

    Manager

    Base Installation Guide

    Version

    5.1

    SC32-1362-00

    ���

  • IBM

    Tivoli

    Access

    Manager

    Installation

    Guide

    Version

    5.1

    SC32-1362-00

    ���

  • Note

    Before

    using

    this

    information

    and

    the

    product

    it

    supports,

    read

    the

    information

    in

    “Notices”

    on

    page

    303.

    First

    Edition

    (November

    2003)

    This

    edition

    applies

    to

    version

    5,

    release

    1,

    modification

    0

    of

    IBM

    Tivoli

    Access

    Manager

    (product

    number

    5724-C08)

    and

    to

    all

    subsequent

    releases

    and

    modifications

    until

    otherwise

    indicated

    in

    new

    editions.

    ©

    Copyright

    International

    Business

    Machines

    Corporation

    2001,

    2003.

    All

    rights

    reserved.

    US

    Government

    Users

    Restricted

    Rights

    Use,

    duplication

    or

    disclosure

    restricted

    by

    GSA

    ADP

    Schedule

    Contract

    with

    IBM

    Corp.

  • Contents

    Preface

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . ix

    Who

    should

    read

    this

    book

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . ix

    What

    this

    book

    contains

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . ix

    Publications

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xi

    Release

    information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xi

    Base

    information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xi

    Web

    security

    information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xi

    Developer

    references

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xii

    Technical

    supplements

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xiii

    Related

    publications

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xiii

    Accessing

    publications

    online

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xvi

    Accessibility

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xvi

    Contacting

    software

    support

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xvi

    Conventions

    used

    in

    this

    book

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xvi

    Typeface

    conventions

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xvi

    Operating

    system

    differences

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xvii

    Part

    1.

    Planning

    for

    installation

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 1

    Chapter

    1.

    Installation

    overview

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 3

    Planning

    for

    deployment

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 4

    Secure

    domain

    overview

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 5

    Tivoli

    Access

    Manager

    installation

    components

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 6

    Tivoli

    Access

    Manager

    Base

    components

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 6

    Prerequisite

    products

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9

    Types

    of

    Tivoli

    Access

    Manager

    systems

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 11

    Installation

    methods

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15

    Installation

    wizards

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15

    Native

    installation

    utilities

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15

    Installation

    process

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 17

    Chapter

    2.

    System

    requirements

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 19

    Supported

    registries

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 19

    IBM

    Tivoli

    Directory

    Server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 19

    IBM

    Security

    Server

    for

    OS/390

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 21

    IBM

    z/OS

    Security

    Server

    LDAP

    Server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 21

    Lotus

    Domino

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22

    Microsoft

    Active

    Directory

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22

    Netscape

    iPlanet

    and

    Sun

    ONE

    Directory

    Server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22

    Novell

    eDirectory

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22

    Disk

    space

    and

    memory

    requirements

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 24

    Supported

    platforms,

    including

    required

    patches

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 26

    Backward

    compatibility

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 30

    Hardware

    acceleration

    card

    support

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 31

    Chapter

    3.

    Internationalization

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 33

    Language

    support

    overview

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 34

    Installing

    language

    support

    packages

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 35

    Installing

    language

    packages

    for

    IBM

    Tivoli

    Directory

    Server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 37

    Uninstalling

    language

    support

    packages

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 39

    Locale

    environment

    variables

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 39

    LANG

    variable

    on

    UNIX

    systems

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 40

    LANG

    variable

    on

    Windows

    systems

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 41

    Using

    locale

    variants

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 41

    ©

    Copyright

    IBM

    Corp.

    2001,

    2003

    iii

  • Message

    catalogs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 42

    Text

    encoding

    (code

    set)

    support

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 43

    Location

    of

    code

    set

    files

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 43

    Part

    2.

    Base

    system

    installation

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 45

    Chapter

    4.

    Setting

    up

    the

    registry

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 47

    Setting

    up

    IBM

    Tivoli

    Directory

    Server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 48

    Pre-installation

    requirements

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 48

    Installing

    using

    the

    installation

    wizard

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 50

    Installing

    using

    native

    utilities

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 51

    Setting

    up

    IBM

    z/OS

    and

    OS/390

    Security

    Servers

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 70

    Updating

    schema

    files

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 70

    Adding

    suffixes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 70

    Configuring

    Tivoli

    Access

    Manager

    for

    LDAP

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 72

    Native

    authentication

    user

    administration

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 72

    Setting

    up

    Lotus

    Domino

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 74

    Creating

    a

    Tivoli

    Access

    Manager

    administrative

    user

    for

    Domino

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 74

    Installing

    a

    Lotus

    Notes

    client

    on

    the

    Domino

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 75

    Setting

    up

    Microsoft

    Active

    Directory

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 77

    Active

    Directory

    considerations

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 77

    Creating

    an

    Active

    Directory

    domain

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 77

    Joining

    an

    Active

    Directory

    domain

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 78

    Creating

    an

    Active

    Directory

    administrative

    user

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 80

    Active

    Directory

    replication

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 80

    Setting

    up

    Novell

    eDirectory

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 82

    When

    using

    Novell

    eDirectory

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 82

    Setting

    up

    Sun

    ONE

    Directory

    Server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 84

    Chapter

    5.

    Setting

    up

    the

    policy

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 89

    Installing

    using

    the

    installation

    wizard

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 89

    Installing

    using

    native

    utilities

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 90

    AIX:

    Installing

    the

    policy

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 90

    HP-UX:

    Installing

    the

    policy

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 91

    Linux:

    Installing

    the

    policy

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 93

    Solaris:

    Installing

    the

    policy

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 94

    Windows:

    Installing

    the

    policy

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 95

    Chapter

    6.

    Setting

    up

    an

    authorization

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 99

    Installing

    using

    the

    installation

    wizard

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 99

    Installing

    using

    native

    utilities

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 100

    AIX:

    Installing

    an

    authorization

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 100

    HP-UX:

    Installing

    an

    authorization

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 101

    Linux:

    Installing

    an

    authorization

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 102

    Solaris:

    Installing

    an

    authorization

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 103

    Windows:

    Installing

    an

    authorization

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 104

    Chapter

    7.

    Setting

    up

    a

    development

    (ADK)

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 107

    Installing

    using

    the

    installation

    wizard

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 107

    Installing

    using

    native

    utilities

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 108

    AIX:

    Installing

    a

    development

    (ADK)

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 108

    HP-UX:

    Installing

    a

    development

    (ADK)

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 109

    Linux:

    Installing

    a

    development

    (ADK)

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 110

    Solaris:

    Installing

    a

    development

    (ADK)

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 111

    Windows:

    Installing

    a

    development

    (ADK)

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 112

    Chapter

    8.

    Setting

    up

    a

    Java

    runtime

    environment

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 113

    Installing

    using

    the

    installation

    wizard

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 113

    Installing

    using

    native

    utilities

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 113

    iv

    IBM

    Tivoli

    Access

    Manager:

    Installation

    Guide

  • AIX:

    Installing

    a

    Java

    runtime

    environment

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 114

    HP-UX:

    Installing

    a

    Java

    runtime

    environment

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 114

    Linux:

    Installing

    a

    Java

    runtime

    environment

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 115

    Solaris:

    Installing

    a

    Java

    runtime

    environment

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 116

    Windows:

    Installing

    a

    Java

    runtime

    environment

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 117

    Chapter

    9.

    Setting

    up

    a

    policy

    proxy

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 119

    Installing

    using

    the

    installation

    wizard

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 119

    Installing

    using

    native

    utilities

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 120

    AIX:

    Installing

    a

    policy

    proxy

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 120

    HP-UX:

    Installing

    a

    policy

    proxy

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 121

    Linux:

    Installing

    a

    policy

    proxy

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 122

    Solaris:

    Installing

    a

    policy

    proxy

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 123

    Windows:

    Installing

    a

    policy

    proxy

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 124

    Chapter

    10.

    Setting

    up

    a

    runtime

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 125

    Installing

    using

    the

    installation

    wizard

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 125

    Installing

    using

    native

    utilities

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 126

    AIX:

    Installing

    a

    runtime

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 126

    HP-UX:

    Installing

    a

    runtime

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 127

    Linux:

    Installing

    a

    runtime

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 128

    Solaris:

    Installing

    a

    runtime

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 128

    Windows:

    Installing

    a

    runtime

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 129

    Chapter

    11.

    Setting

    up

    a

    Web

    Portal

    Manager

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 131

    Installing

    using

    the

    installation

    wizard

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 131

    Installing

    using

    native

    utilities

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 133

    AIX:

    Installing

    a

    Web

    Portal

    Manager

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 133

    HP-UX:

    Installing

    a

    Web

    Portal

    Manager

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 135

    Linux:

    Installing

    a

    Web

    Portal

    Manager

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 137

    Solaris:

    Installing

    a

    Web

    Portal

    Manager

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 139

    Windows:

    Installing

    a

    Web

    Portal

    Manager

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 141

    Part

    3.

    Reference

    information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 143

    Chapter

    12.

    Installing

    prerequisite

    products

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 145

    Installing

    the

    Global

    Security

    Kit

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 145

    AIX:

    Installing

    the

    Global

    Security

    Kit

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 145

    HP-UX:

    Installing

    the

    Global

    Security

    Kit

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 145

    Linux:

    Installing

    the

    Global

    Security

    Kit

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 146

    Solaris:

    Installing

    the

    Global

    Security

    Kit

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 147

    Windows:

    Installing

    the

    Global

    Security

    Kit

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 147

    Setting

    up

    the

    GSKit

    iKeyman

    utility

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 147

    Installing

    IBM

    Tivoli

    Directory

    Client

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 150

    AIX:

    Installing

    IBM

    Tivoli

    Directory

    Client

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 150

    HP-UX:

    Installing

    IBM

    Tivoli

    Directory

    Client

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 150

    Linux:

    Installing

    the

    IBM

    Tivoli

    Directory

    Client

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 151

    Solaris:

    Installing

    IBM

    Tivoli

    Directory

    Client

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 151

    Windows:

    Installing

    IBM

    Tivoli

    Directory

    Client

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 152

    Installing

    IBM

    JRE

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 153

    AIX:

    Installing

    IBM

    JRE,

    Version

    1.3.1.5

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 153

    HP-UX:

    Installing

    IBM

    JRE,

    Version

    1.3.1

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 153

    Linux:

    Installing

    IBM

    JRE,

    Version

    1.3.1

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 154

    Solaris:

    Installing

    IBM

    JRE,

    Version

    1.3.1

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 155

    Windows:

    Installing

    IBM

    JRE,

    Version

    1.3.1

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 155

    Installing

    WebSphere

    Application

    Server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 157

    AIX:

    Installing

    WebSphere

    Application

    Server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 157

    HP-UX:

    Installing

    WebSphere

    Application

    Server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 159

    Linux:

    Installing

    WebSphere

    Application

    Server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 161

    Contents

    v

  • Solaris:

    Installing

    WebSphere

    Application

    Server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 162

    Windows:

    Installing

    WebSphere

    Application

    Server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 164

    Installing

    the

    Web

    Administration

    Tool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 167

    AIX:

    Installing

    the

    Web

    Administration

    Tool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 167

    HP-UX:

    Installing

    the

    Web

    Administration

    Tool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 168

    Linux:

    Installing

    the

    Web

    Administration

    Tool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 169

    Solaris:

    Installing

    the

    Web

    Administration

    Tool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 170

    Windows:

    Installing

    the

    Web

    Administration

    Tool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 170

    Installing

    the

    Web

    Administration

    Tool

    into

    WebSphere

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 171

    Chapter

    13.

    Uninstalling

    components

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 173

    Unconfiguring

    Tivoli

    Access

    Manager

    components

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 173

    Unconfiguring

    IBM

    Tivoli

    Directory

    Server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 174

    AIX:

    Removing

    packages

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 174

    HP-UX:

    Removing

    packages

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 175

    Linux:

    Removing

    packages

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 176

    Solaris:

    Removing

    packages

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 176

    Windows:

    Removing

    packages

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 177

    Chapter

    14.

    Installation

    wizard

    scenarios

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 179

    Using

    the

    install_ldap_server

    wizard

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 180

    Pre-installation

    requirements

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 180

    install_ldap_server

    scenario

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 181

    Using

    the

    install_ammgr

    wizard

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 189

    Chapter

    15.

    Installation

    wizard

    options

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 197

    Access

    Manager

    Runtime

    (LDAP)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 198

    Access

    Manager

    Runtime

    (Active

    Directory)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 200

    Access

    Manager

    Runtime

    (Domino)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 203

    install_amacld

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 205

    install_amadk

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 207

    install_amjrte

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 208

    install_ammgr

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 209

    install_amproxy

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 211

    install_amrte

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 212

    install_amwpm

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 213

    install_ldap_server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 214

    Chapter

    16.

    pdconfig

    options

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 217

    Access

    Manager

    Runtime

    LDAP

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 218

    Access

    Manager

    Runtime

    Active

    Directory

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 219

    Access

    Manager

    Runtime

    Domino

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 221

    Access

    Manager

    Authorization

    Server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 222

    Access

    Manager

    Java

    Runtime

    Environment

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 223

    Access

    Manager

    Policy

    Server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 224

    Access

    Manager

    Policy

    Proxy

    Server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 225

    Access

    Manager

    Web

    Portal

    Manager

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 226

    Chapter

    17.

    Enabling

    Secure

    Sockets

    Layer

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 227

    Configuring

    IBM

    Tivoli

    Directory

    Server

    for

    SSL

    access

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 227

    Creating

    the

    key

    database

    file

    and

    the

    certificate

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 228

    Obtaining

    a

    personal

    certificate

    from

    a

    certificate

    authority

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 229

    Creating

    and

    extracting

    a

    self-signed

    certificate

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 229

    Enabling

    SSL

    access

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 230

    Configuring

    IBM

    z/OS

    and

    OS/390

    security

    servers

    for

    SSL

    access

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 232

    Setting

    up

    the

    security

    options

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 232

    Creating

    a

    key

    database

    file

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 233

    Configuring

    Microsoft

    Active

    Directory

    for

    SSL

    access

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 234

    Exporting

    the

    certificate

    on

    the

    Active

    Directory

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 234

    Importing

    the

    certificate

    on

    the

    LDAP

    client

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 235

    vi

    IBM

    Tivoli

    Access

    Manager:

    Installation

    Guide

  • Testing

    SSL

    access

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 236

    Configuring

    Novell

    eDirectory

    server

    for

    SSL

    access

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 236

    Creating

    an

    organizational

    certificate

    authority

    object

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 237

    Creating

    a

    self-signed

    certificate

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 237

    Creating

    a

    server

    certificate

    for

    the

    LDAP

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 237

    Enabling

    SSL

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 238

    Adding

    the

    self-signed

    CA

    certificate

    to

    the

    IBM

    key

    file

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 238

    Configuring

    Sun

    ONE

    Directory

    Server

    for

    SSL

    access

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 239

    Obtaining

    a

    server

    certificate

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 239

    Installing

    the

    server

    certificate

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 240

    Enabling

    SSL

    access

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 241

    Configuring

    IBM

    Tivoli

    Directory

    Client

    for

    SSL

    access

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 241

    Creating

    a

    key

    database

    file

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 242

    Adding

    a

    signer

    certificate

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 243

    Testing

    SSL

    access

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 243

    Configuring

    LDAP

    server

    and

    client

    authentication

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 244

    Creating

    a

    key

    database

    file

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 244

    Obtaining

    a

    personal

    certificate

    from

    a

    certificate

    authority

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 245

    Creating

    and

    extracting

    a

    self-signed

    certificate

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 246

    Adding

    a

    signer

    certificate

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 247

    Testing

    SSL

    access

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 247

    Chapter

    18.

    AIX:

    Setting

    up

    a

    standby

    policy

    server

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 249

    Pre-installation

    requirements

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 250

    HACMP

    environment

    scenario

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 251

    Example

    HACMP

    configuration

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 253

    Creating

    a

    standby

    policy

    server

    environment

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 261

    Script:

    Setting

    UIDs

    for

    both

    the

    primary

    and

    standby

    systems

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 265

    Script:

    Linking

    files

    and

    directories

    on

    the

    primary

    system

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 267

    Example:

    Verifying

    primary

    server’s

    directories,

    soft

    links

    and

    permissions

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 268

    Script:

    Linking

    from

    the

    AIX

    system

    files

    to

    the

    shared

    directory

    on

    the

    standby

    system

    .

    .

    .

    .

    .

    .

    .

    . 270

    Example:

    Verifying

    standby

    server’s

    directories,

    soft

    links

    and

    permissions

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 271

    Chapter

    19.

    Tivoli

    Access

    Manager

    utilities

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 273

    amwpmcfg

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 274

    ivrgy_tool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 277

    pdbackup

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 279

    pdconfig

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 287

    pdjrtecfg

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 288

    pd_start

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 292

    Chapter

    20.

    Using

    response

    files

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 293

    Response

    file

    template

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 294

    Notices

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 303

    OpenSSL

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 305

    XML

    Parser

    Toolkit

    License

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 307

    Pluggable

    Authentication

    Module

    License

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 308

    Apache

    Axis

    Servlet

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 308

    JArgs

    command

    line

    option

    parsing

    suite

    for

    Java

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 309

    Java

    DOM

    implementation

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 309

    Alfalfa

    Software

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 310

    Kerberos

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 311

    InfoZip

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 311

    gSOAP

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 312

    Apache

    Software

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 313

    Trademarks

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 314

    Glossary

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 315

    Contents

    vii

  • Index

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 321

    viii

    IBM

    Tivoli

    Access

    Manager:

    Installation

    Guide

  • Preface

    IBM®

    Tivoli®

    Access

    Manager

    (Tivoli

    Access

    Manager)

    is

    the

    base

    software

    that

    is

    required

    to

    run

    applications

    in

    the

    Access

    Manager

    product

    suite.

    It

    enables

    the

    integration

    of

    Access

    Manager

    applications

    that

    provide

    a

    wide

    range

    of

    authorization

    and

    management

    solutions.

    Sold

    as

    an

    integrated

    solution,

    these

    products

    provide

    an

    access

    control

    management

    solution

    that

    centralizes

    network

    and

    application

    security

    policy

    for

    e-business

    applications.

    Note:

    IBM

    Tivoli

    Access

    Manager

    is

    the

    new

    name

    of

    the

    previously

    released

    software

    entitled

    Tivoli

    SecureWay®

    Policy

    Director.

    Also,

    for

    users

    familiar

    with

    the

    Tivoli

    SecureWay

    Policy

    Director

    software

    and

    documentation,

    the

    term

    management

    server

    is

    now

    referred

    to

    as

    policy

    server.

    The

    IBM

    Tivoli

    Access

    Manager

    Base

    Installation

    Guide

    explains

    how

    to

    install

    and

    configure

    Tivoli

    Access

    Manager

    Base

    software.

    Who

    should

    read

    this

    book

    This

    guide

    is

    for

    system

    administrators

    responsible

    for

    the

    installation

    and

    deployment

    of

    IBM

    Tivoli

    Access

    Manager.

    Readers

    should

    be

    familiar

    with

    the

    following:

    v

    PC

    and

    UNIX®

    operating

    systems

    v

    Database

    architecture

    and

    concepts

    v

    Security

    management

    v

    Internet

    protocols,

    including

    HTTP,

    TCP/IP,

    File

    Transfer

    Protocol

    (FTP),

    and

    Telnet

    v

    Lightweight

    Directory

    Access

    Protocol

    (LDAP)

    and

    directory

    services

    v

    Authentication

    and

    authorization

    If

    you

    are

    enabling

    Secure

    Sockets

    Layer

    (SSL)

    communication,

    you

    also

    should

    be

    familiar

    with

    SSL

    protocol,

    key

    exchange

    (public

    and

    private),

    digital

    signatures,

    cryptographic

    algorithms,

    and

    certificate

    authorities.

    What

    this

    book

    contains

    Part

    1,

    “Planning

    for

    installation”

    includes

    the

    following

    chapters:

    v

    Chapter

    1,

    “Installation

    overview,”

    on

    page

    3

    Provides

    an

    overview

    of

    installing

    Tivoli

    Access

    Manager

    software

    using

    installation

    wizards

    or

    native

    installation

    utilities.

    v

    Chapter

    2,

    “System

    requirements,”

    on

    page

    19

    Lists

    software

    and

    hardware

    requirements

    necessary

    for

    successful

    installation

    of

    Tivoli

    Access

    Manager

    software.

    v

    Chapter

    3,

    “Internationalization,”

    on

    page

    33

    Instructs

    how

    to

    install

    language

    packages

    to

    enable

    Tivoli

    Access

    Manager

    for

    non-English

    environments.

    Part

    2,

    “Base

    system

    installation”

    includes

    the

    following

    chapters:

    v

    Chapter

    4,

    “Setting

    up

    the

    registry

    server,”

    on

    page

    47

    ©

    Copyright

    IBM

    Corp.

    2001,

    2003

    ix

  • Describes

    how

    to

    set

    up

    and

    configure

    supported

    registries

    for

    use

    with

    Tivoli

    Access

    Manager.

    Chapters

    5

    through

    11

    provide

    instructions

    on

    how

    to

    install

    and

    configure

    Tivoli

    Access

    Manager

    components

    and

    prerequisite

    products

    to

    set

    up

    Tivoli

    Access

    Manager

    Base

    systems.

    Instructions

    are

    provided

    for

    both

    installation

    wizards

    and

    native

    command

    line

    utilities.

    v

    Chapter

    5,

    “Setting

    up

    the

    policy

    server,”

    on

    page

    89

    v

    Chapter

    6,

    “Setting

    up

    an

    authorization

    server,”

    on

    page

    99

    v

    Chapter

    7,

    “Setting

    up

    a

    development

    (ADK)

    system,”

    on

    page

    107

    v

    Chapter

    8,

    “Setting

    up

    a

    Java

    runtime

    environment

    system,”

    on

    page

    113

    v

    Chapter

    9,

    “Setting

    up

    a

    policy

    proxy

    server,”

    on

    page

    119

    v

    Chapter

    10,

    “Setting

    up

    a

    runtime

    system,”

    on

    page

    125

    v

    Chapter

    11,

    “Setting

    up

    a

    Web

    Portal

    Manager

    system,”

    on

    page

    131

    Part

    3,

    “Reference

    information”

    includes

    the

    following

    chapters:

    v

    Chapter

    12,

    “Installing

    prerequisite

    products,”

    on

    page

    145

    Describes

    how

    to

    install

    prerequisite

    products

    that

    are

    required

    on

    specific

    Tivoli

    Access

    Manager

    systems.

    Products

    include

    the

    Global

    Security

    Kit

    (GSKit),

    the

    IBM

    Tivoli

    Directory

    Client,

    IBM

    JRE,

    IBM

    WebSphere

    Application

    Server,

    and

    the

    IBM

    Tivoli

    Directory

    Server

    Web

    Administration

    Tool.

    v

    Chapter

    13,

    “Uninstalling

    components,”

    on

    page

    173

    Provides

    instructions

    for

    unconfiguring

    and

    removing

    prerequisite

    products

    and

    Tivoli

    Access

    Manager

    packages.

    v

    Chapter

    14,

    “Installation

    wizard

    scenarios,”

    on

    page

    179

    Provides

    scenarios

    and

    descriptions

    of

    configuring

    options

    that

    you

    are

    prompted

    for

    using

    installation

    wizards.

    v

    Chapter

    15,

    “Installation

    wizard

    options,”

    on

    page

    197

    Provides

    descriptions

    of

    configuration

    options

    that

    you

    are

    prompted

    for

    during

    Tivoli

    Access

    Manager

    configuration

    using

    installation

    wizards.

    v

    Chapter

    16,

    “pdconfig

    options,”

    on

    page

    217

    Provides

    descriptions

    of

    configuration

    options

    that

    you

    are

    prompted

    for

    during

    Tivoli

    Access

    Manager

    configuration

    using

    the

    pdconfig

    utility.

    v

    Chapter

    17,

    “Enabling

    Secure

    Sockets

    Layer,”

    on

    page

    227

    Explains

    how

    to

    enable

    SSL

    data

    encryption

    for

    secure

    communications

    between

    the

    registry

    server

    and

    IBM

    Tivoli

    Directory

    Clients.

    v

    Chapter

    18,

    “AIX:

    Setting

    up

    a

    standby

    policy

    server,”

    on

    page

    249

    Describes

    how

    to

    set

    up

    a

    standby

    policy

    server

    in

    the

    event

    of

    a

    system

    failure

    (on

    AIX®

    only).

    This

    capability

    requires

    additional

    software

    and

    hardware,

    including

    High

    Availability

    Cluster

    Multiprocessing

    (HACMP)

    software.

    v

    Chapter

    19,

    “Tivoli

    Access

    Manager

    utilities,”

    on

    page

    273

    Provides

    reference

    information

    about

    configuration

    utilities

    used

    when

    setting

    up

    Tivoli

    Access

    Manager

    systems.

    v

    Chapter

    20,

    “Using

    response

    files,”

    on

    page

    293

    Provides

    instructions

    for

    how

    to

    use

    response

    files

    to

    install

    multiple

    products

    on

    multiple

    machines

    at

    the

    same

    time.

    x

    IBM

    Tivoli

    Access

    Manager:

    Installation

    Guide

  • Publications

    Review

    the

    descriptions

    of

    the

    Tivoli

    Access

    Manager

    library,

    the

    prerequisite

    publications,

    and

    the

    related

    publications

    to

    determine

    which

    publications

    you

    might

    find

    helpful.

    After

    you

    determine

    the

    publications

    you

    need,

    refer

    to

    the

    instructions

    for

    accessing

    publications

    online.

    Additional

    information

    about

    the

    IBM

    Tivoli

    Access

    Manager

    for

    e-business

    product

    itself

    can

    be

    found

    at:

    http://www.ibm.com/software/tivoli/products/access-mgr-e-bus/

    The

    Tivoli

    Access

    Manager

    library

    is

    organized

    into

    the

    following

    categories:

    v

    “Release

    information”

    v

    “Base

    information”

    v

    “Web

    security

    information”

    v

    “Developer

    references”

    on

    page

    xii

    v

    “Technical

    supplements”

    on

    page

    xiii

    Release

    information

    v

    IBM

    Tivoli

    Access

    Manager

    for

    e-business

    Read

    This

    First

    (GI11-4155-00)

    Provides

    information

    for

    installing

    and

    getting

    started

    using

    Tivoli

    Access

    Manager.

    v

    IBM

    Tivoli

    Access

    Manager

    for

    e-business

    Release

    Notes

    (GI11-4156-00)

    Provides

    late-breaking

    information,

    such

    as

    software

    limitations,

    workarounds,

    and

    documentation

    updates.

    Base

    information

    v

    IBM

    Tivoli

    Access

    Manager

    Base

    Installation

    Guide

    (SC32-1362-00)

    Explains

    how

    to

    install

    and

    configure

    the

    Tivoli

    Access

    Manager

    base

    software,

    including

    the

    Web

    Portal

    Manager

    interface.

    This

    book

    is

    a

    subset

    of

    IBM

    Tivoli

    Access

    Manager

    for

    e-business

    Web

    Security

    Installation

    Guide

    and

    is

    intended

    for

    use

    with

    other

    Tivoli

    Access

    Manager

    products,

    such

    as

    IBM

    Tivoli

    Access

    Manager

    for

    Business

    Integration

    and

    IBM

    Tivoli

    Access

    Manager

    for

    Operating

    Systems.

    v

    IBM

    Tivoli

    Access

    Manager

    Base

    Administration

    Guide

    (SC32-1360-00)

    Describes

    the

    concepts

    and

    procedures

    for

    using

    Tivoli

    Access

    Manager

    services.

    Provides

    instructions

    for

    performing

    tasks

    from

    the

    Web

    Portal

    Manager

    interface

    and

    by

    using

    the

    pdadmin

    command.

    Web

    security

    information

    v

    IBM

    Tivoli

    Access

    Manager

    for

    e-business

    Web

    Security

    Installation

    Guide

    (SC32-1361-00)

    Provides

    installation,

    configuration,

    and

    removal

    instructions

    for

    the

    Tivoli

    Access

    Manager

    base

    software

    as

    well

    as

    the

    Web

    Security

    components.

    This

    book

    is

    a

    superset

    of

    IBM

    Tivoli

    Access

    Manager

    Base

    Installation

    Guide.

    v

    IBM

    Tivoli

    Access

    Manager

    for

    e-business

    WebSEAL

    Administration

    Guide

    (SC32-1359-00)

    Provides

    background

    material,

    administrative

    procedures,

    and

    technical

    reference

    information

    for

    using

    WebSEAL

    to

    manage

    the

    resources

    of

    your

    secure

    Web

    domain.

    Preface

    xi

    http://www.ibm.com/software/tivoli/products/access-mgr-e-bus/

  • v

    IBM

    Tivoli

    Access

    Manager

    for

    e-b