Security Verify Access overview
ISAM supports authentication, authorization, data security, and resource management capabilities. We use Security Verify Access in conjunction with standard Internet-based applications to build highly secure and well-managed intranets.
ISAM provides the following frameworks:
- Authentication framework
- The Security Verify Access authentication service uses a wide range of built-in authenticators and supports external authenticators.
- Authorization framework
- The authorization service, accessed through a standard authorization API, provides permit and deny decisions on access requests for native ISAM servers and other applications. The authorization service, together with resource managers, provides a standard authorization mechanism for business network systems.
Security Verify Access can be integrated into existing and emerging infrastructures to provide secure, centralized policy management capability. The following resource managers are some of the existing resource managers:
- IBM Security Verify Access for Web WebSEAL
- Manages and protects web-based information and resources. WebSEAL is included with ISAM. Provides a layer of authorization policy enforcement on Linux and UNIX operating systems in addition to that provided by the native operating system.
Existing applications can take advantage of the ISAM authorization service and provide a common security policy for the entire enterprise.
- Core technologies
- Security policy overview
- Authorization API standard
- Authorization: conceptual model
- ISAM authorization service
- Implementation of a network security policy
- ISAM authorization API
- External authorization capability
Parent topic: Verify Access Platform and Supporting Components administration