Enterprise Identity Mapping concepts

 

Use this information learn about important EIM concepts that understand to implement EIM successfully.

A conceptual understanding of how Enterprise Identity Mapping (EIM) works is necessary to fully understand how you can use EIM in your enterprise. Although the configuration and implementation of EIM APIs can differ among server platforms, EIM concepts are common across IBM®

e(logo)server platforms.

Figure 1 provides an EIM implementation example in an enterprise. Three servers act as EIM clients and contain EIM-enabled applications that request EIM data using EIM lookup operations

Refer to number 6 in Figure 1. The domain controller

Refer to number 1 in Figure 1 stores information about the EIM domain

Refer to number 2 in Figure 1, which includes an EIM identifier

Refer to number 3 in Figure 1, associations

Refer to number 4 in Figure 1 between these EIM identifiers and user identities, and EIM registry definitions

Refer to number 5 in Figure 1. Figure 1. An EIM implementation example

Example EIM implementation

Review the following information to learn more about these EIM

e(logo)server concepts:

 

Parent topic:

Enterprise Identity Mapping (EIM)

 

Related concepts


LDAP concepts for EIM
Enterprise Identity Mapping concepts