Identity Management implementation with IBM Tivoli Identity Manager

[This article is sponsored by Peningo Systems, Inc., a provider of Tivoli Consulting Services on a nationwide basis. For more information on Peningo Systems, please go to the  Peningo Tivoli Consultants page. ]


IBM has recently released the Redbook, “Identity Management Design Guide with IBM Tivoli Identity Manager ”.  This IBM Redbook provides a methodology for designing an Identity Management solution with IBM Tivoli Identity Manager 4.6. Starting from the high-level, organizational viewpoint IBM shows how to define user registration and maintenance processes using the self-registration and self-care interfaces as well as the delegated administration capabilities.


Identity Management is the concept of providing a unifying interface to manage all aspects related to individuals and their interactions with the business. It is the process that enables business initiatives by efficiently managing the user lifecycle (including identity/resource provisioning for people (users)), and by integrating into the required business processes. Identity management encompasses all the data and processes related to the representation of an individual involved in electronic transactions.


We at Peningo Systems strongly recommend this Redbook for any Tivoli Security Consultant / Security Architect who are involved in deploying an Identity Management solution using IBM Tivoli Identity Manager.


The Table of Contents of this Redbook is as follows:


Part 1. Architecture and design

Chapter 1. Business context for Identity and Credential Management
Chapter 2. Architecting Identity and Credential Management Solution
Chapter 3. Identity Manager component structure
Chapter 4. Detailed component design
Chapter 5. Operational solution design
Chapter 6. Tivoli Access Manager integration

Part 2. Customer environment

Chapter 7. Tivoli Austin Airlines, Inc.
Chapter 8. Identity Management design
Chapter 9. Technical implementation: Phase I
Chapter 10. Technical implementation: Phase II
Chapter 11. Technical implementation: Phase III
Chapter 12. Technical implementation: Phase IV

Part 3. Appendixes

Appendix A. Corporate policy and standards
Appendix B. Organization chart design


If you wish to download this Redbook you can to the following link:


Identity Management Design Guide using IBM Tivoli Identity Manager


If you wish to view the IBM Resource link for this Redbook, please go to the flowing link:


Click here to view the Redbook Resource page


If you wish to purchase a hard copy of this Redbook, please go to the following link:


Click here to Purchase this RedBook

If you are an “End Client” looking for IT Consulting Service providers to support your Applications, Peningo Systems provides Consultants with expertise in many areas including:

To see Peningo Systems areas of expertise, please go to the Peningo Technical Areas page or go to the Peningo Tivoli Consultants page.

[Slashdot] [Digg] [Reddit] [] [Facebook] [Technorati] [Google] [StumbleUpon]

About Edward Pellon

About Peningo Systems ( ) Peningo Systems and it founders have been involved in IT Consulting for over 30 years. Our goal is to support the individual IT Consultant by providing an avenue for them to be in contact directly to the end client. By doing this we reduce the many layers and tiers of organizations that are involved with placement of an IT Consultant. By reducing these layers and tiers, cost can be significantly reduced to the end client, while still providing the room for the Consultant to increase their revenues. Peningo is a for profit organization. We have decided to earn our “keep” by advocating, establishing and supporting a “market place” where the IT consultant and the “end client” may function without the interference of tiers of “prestigious” companies that bring to the consulting assignment excessive Markups and very little else. At Peningo we feel that the IT Consultant should be paid adequate rates commensurate with their skills and the personal sacrifice inherent in the life of an IT consultant. These allows us to field capable, motivated consultants that will contribute successfully to the “end client’s” systems development and implementation, while attracting to the IT industry new talent that otherwise would go to more lucrative pursuits. With the elimination of the “prestigious ones” there will be costs savings that will allow for the consultant to be paid a higher rate and for the client to reduce its costs. Both objectives represents Peningo’s Mission.
This entry was posted in IBM Tivoli, Offshoring, Tivoli, Tivoli Consulting, Tivoli Federated Identity Manager, Tivoli Identity Manager, Tivoli Security. Bookmark the permalink.

Comments are closed.