Planning Enterprise Identity Mapping for i5/OS®

 

There are multiple technologies and services that Enterprise Identity Mapping (EIM) encompasses on the System i™ platform. Prior to configuring EIM on your server, you should decide what functionality you want to implement by using EIM and single signon capabilities.

Before implementing EIM, you should have decided basic security requirements for your network and have implemented those security measures. EIM provides administrators and users easier identity management throughout the enterprise. When used with network authentication service, EIM provides single signon capabilities for your enterprise.

If you plan on using Kerberos to authenticate users as part of a single signon implementation, you should also configure network authentication service. See Plan network authentication service for information about planning network authentication service and Plan single signon for information about planning a single signon environment.

To learn more about how to plan your systems EIM configuration, review the following information:

 

Parent topic:

Planning for Enterprise Identity Mapping