*
W.v)b]Nu(network-based authentication). gkZ
GIP(Internet Protocol) VR&YA8N@j'.W<:&&
nOBPOP(Protected Object Policy). POP(Protect Object
Policy) |6
Y
Y_dRNu(multi-factor authentication). gkZ!N3
LsGNu9';gkO)NuO5O-&G`OB
POP(Protected Object Policy). 9&in,8#Zx! kQW
<:&n!-gkZBgkZL'/O#MgkZL'/d+ O
#ZeQYNNuX_UOY.POP(Protected Object Policy)
|6
\h0Nu(step-up authentication). g|8:HNu9'
h~86!G8Og,ZxGpolicy <.!{s/$9'G
Nu;-&G`OBPOP(Protected Object Policy). \h0N
uPOP&gkOigkZ!VnxZx! W<:Ob'X)
/9'GNu;gkOvJF5Gv8,gkZ!VRQZ
x;8#OBpolicy!-d8OB9'!-NuX_UOY.
L[gNB(SSO: Single Signon). gkZ!QxNWB
Oi""GnC.ILG!30{8NNWBOvJm5)/
nC.ILG!W<:RvVBbI.

[NzgNB

(GSO:
Global Signon) |6
5^NL'(domain name). NM]ANd]:!-#:.C
:[GL'.5^NL':P..ZN8PGBOCGO'L
'8N8:KOY.9&in,#:.C:[GO|Q5^N
L'(FQDN)Las400.rchland.vnet.ibm.comOfl,Y=: "
"5^NL'TOY. as400.rchland.vnet.ibm.com,
vnet.ibm.com, ibm.com
5^N(domain). (1) xk-q:&x/Og8kxkGBq
{8NbIOBgkZ,C:[WZxGm.Wl-. (2) %
LM3.ZxLxk&nO!VBC:[W.v)NP.

5^NL'

(domain name) |6
p:d.:06(directory schema). p:d.!*8/vV
BCY%S: /|W@j'.,!:.S: /|W@j'
.,!:BS: *8.(9&in,n2S:L8gX_O
Bv,W.mp:d.!kXn2S:L8gRvVBv);
$GUOY.
pU(daemon). ,SGBVb{8NC:[|'G bI(9:
W.v)&n);v`Ob'X+N8NG`GBANW%.O
NpU:XgB:)&v`Ob'XZ?8N..EGm,*
SvpU:$b{8N[?UOY.
pvP-m(digital signature). e-commerce!-%LM\'
!_!GE*%LM\'G O#|[!XgOB%LMN,%
LM\'vEZ!\'G +a:WR:&.NOm'6!
I:;NDRvVTUOY.
s
slCDO(routing file). ^Cv8:;&nOBmI;w
TOBASCII DO
18S(run time). C:[ANW%;G`OBC#.18S/
f:G`/fTOY.
9v:..(registry). gkZ,C:[WRA.~n!kQW
<:W8:$8&wTOB%LMzeR
j(rule). L%.-v!L%.#G|h(L%.s|)&ND
OmL!{sZ?@d;G`R vV5OOBO*Ls
Gm.mI.
6
6LW9LG(migration). L| v|GB1.:&YYb'
XANW%Guv|GB1.:&3!OBM
^8%LM(metadata). zeH%LMG/:;3mOB%L
M
Y
YNe(bind). ID&ANW%;GY%@j'.M|C~B
M.9&in,ID&*,VRGBY%IDM|C~E*,|D
{N E3/vWG&E3/vM,|~BM
8H|.(security management). 6wG:x!_dQ%
LMWnC.ILGGW<:&&nOb'Q6wGIB;
v$OB|.T"
8#vX(quality of protection). Nu,+a:WAsLv
C6G6U8NG0GB%LM8HvX
8#@j'.x#(protected object space). ACL WPOP
&{kOb'XgkOggkZW<:GQN)! gkO
76 IBM Tivoli Access Manager for e-business: BEA WebLogic Server kUH;-