Enterprise Identity Mapping concepts
This information lists all the applications for Enterprise Identity Mapping (EIM).
You can implement EIM on any IBM®
platform. However, when you implement EIM on aSystem i™ model, you should be aware of some information that is specific to the System i implementation. Review the following information to learn about i5/OS® applications that are enabled for EIM, user profile considerations, and other topics that can help you use EIM on an System i platform effectively:
- i5/OS user profile considerations for EIM
Being able to perform tasks in Enterprise Identity Mapping (EIM) is not based on your i5/OS user profile authority, but rather on your EIM access control authority.
- i5/OS auditing for EIM
What auditing you perform is an important consideration for your overall security plan.
- EIM enabled applications for i5/OS
EIM can use a variety of i5/OS applications.
Parent topic:
Enterprise Identity Mapping concepts
Related concepts
Enterprise Identity Mapping concepts