Enterprise Identity Mapping (EIM)
Enterprise Identity Mapping (EIM) for the System i™ platform is the i5/OS® implementation of an IBM® infrastructure that allows administrators and application developers to solve the problem of managing multiple user registries across their enterprise.
Most network enterprises face the problem of multiple user registries, which require each person or entity within the enterprise to have a user identity in each registry. The need for multiple user registries quickly grows into a large administrative problem that affects users, administrators, and application developers. Enterprise Identity Mapping (EIM) enables inexpensive solutions for easier management of multiple user registries and user identities in your enterprise.
EIM allows you to create a system of identity mappings, called associations, between the various user identities in various user registries for a person in your enterprise. EIM also provides a common set of APIs that can be used across platforms to develop applications that can use the identity mappings that you create to look up the relationships between user identities. In addition, you can use EIM in conjunction with network authentication service, the i5/OS implementation of Kerberos, to provide a single signon environment.
You can configure and manage EIM through iSeries™ Navigator, the System i graphical user interface. The System i platform uses EIM to enable i5/OS interfaces to authenticate users by means of network authentication service. Applications, as well as i5/OS, can accept Kerberos tickets and use EIM to find the user profile that represents the same person as the Kerberos ticket represents.
To learn more about how EIM works, about EIM concepts, and about how you can use EIM in your enterprise review the following:
- What's new for V5R4
This topic highlights changes to Enterprise Identity Mapping (EIM) for System i for V5R4.
- Printable PDF
Use this to view and print a PDF of this information.
- Enterprise Identity Mapping overview
Use this information to learn about the problems that Enterprise Identity Mapping (EIM) can help you solve, current industry approaches to these problems, and why the EIM approach is a better solution.
- Enterprise Identity Mapping concepts
Use this information learn about important EIM concepts that understand to implement EIM successfully.
- Enterprise Identity Mapping scenarios
Use this information to learn how to manage user identities across different systems within a single signon environment.
- Planning for Enterprise Identity Mapping
Use this information to learn how to develop an Enterprise Identity Mapping (EIM) implementation plan to ensure that you successfully configure EIM for aSystem i model or in a mixed platform environment.
- Configuring Enterprise Identity Mapping
Use this information to learn how to use the Enterprise Identity Mapping (EIM) Configuration wizard to configure EIM for yourSystem i platform.
- Managing Enterprise Identity Mapping
Use this information to learn how to manage your Enterprise Identity Mapping (EIM) domain and domain data, including how to manage EIM domains, identifiers, associations, registry definitions, EIM access control, and more.
- Troubleshooting Enterprise Identity Mapping
Use this information to learn about common problems and errors that you may encounter when you configure and use EIM as well as potential solutions for them
- Enterprise Identity Mapping APIs
Use this information learn about the EIM APIs and how you can use them in your applications and network.
- Related information for Enterprise Identity Mapping
Use this information to learn about other resources and information relevant to using EIM.