BG&C:[ZxG!s@j'.%C.

8#@j'.

(protected object) WPOP(Protect Object Policy) |6
8#@j'.(protected object). ACL WPOP&{kOb'
XgkOggkZW<:GQN)! gkOBG&C:[
ZxGm.%C.POP(Protect Object Policy) W

8#@j

'.x#

(protected object space) |6
9&;(replica). Y%-vGp:d.g;;wTOB-v.
9&;::IGB@dC#;bsC0m%LM+a:;8
eOb'X-v&iwUOY.
m9Le(blade). nC.ILG/$-q:W8:dR&&
xOB8:dR
qnO:N8L2U.(business entitlement). Zx! |QG
Qd;!-gkRvVBZ<Q6G;3mOBgkZG
Q$8G8fS:
g
gkZ9v:..(user registry).

9v:..

(registry) |6
gkZ(user). Y%3N,6w,AN<:,pYL:,ANW%,
ANd]GBC:[!-&xOB-q:&gkOBpg3
N,6w,AN<:,pYL:,ANW%,ANd]GBC:[
-q:(service). -v!-v`GB[w.-q:B%LM&8
;E*zeOb'Q\xQd;LE*(DO-v, HTTP
Server, |Z lm-vWNE-v!-), u9bQ[w(9:
Nb-vGBAN<:-vG-q:)OvV@OY.
S: qO(attribute list). GQ;a$Ob'XgkOB.
e$8&wTOB5)HqO.S: qO:

L'

=

*

V8
N8:KOY.
:06(schema). %LM#L:86&O|OT3mOBmI
.<.N,%LM$GpnN%vKOY.|h|%LM#L:
!-:06BWLm,"WLmGJe,JeMWLm#G|
h&$GUOY.
EZ:VBg.(trusted root). SSL(Secure Sockets Layer)
!-CA(Certificate Authority)Gxk0W,|H80L
'
F
O#-(encryption). C:[8H!-x!%LM&O#X
6AN<:8;gkO)<vV5O-XQ |BN//O
BAN<:
O#(cipher). 0&gkO)8k%LMN//(O#X6)G
b|!BP; vx5OO#-H%LM
W<:GQ(access permission). |<@j'.!{kOBW
<:GQ
W<:&n(access control). C:[8H!-GQLVBg
kZ8LGQLN)HfD8NC:[Zx! W<:RvV
5O8eOBAN<:.
*Rv$(role assignment). gkZ!Xg*R!$GH@
j'.!|X{}QW<:GQ;.BM33,gkZ!T*
R;v$OBAN<:
*R0:-(role activation). *R!W<:GQ;{kOB
AN<:
,a(connection). (1) %LMkE!-$8|^;'QbI
e!gL!3$GB,|. (2) TCP/IP!-EZRvVB%
LM:.2|^-q:&&xOBN3GANd]nC.
ILGgLG fN.NM]!-,a:QC:[GTCP nC
.ILG!-Y%C:[GTCP nC.ILG8N.eUOY.
(3) C:[kE!-NC:[gLGBC:[zpYL:g
L!%LM&|^RvVB81
\NGQ-q:(external authorization service). Tivoli
Access Manager GQa$<NG ONNnC.ILGGB/
f/$GQa$;'XgkRvVBGQAPI 18SC
/WN.m4:GQADK&gkO)L/Q-q:&3_R
vV@OY.
@dDO(response file). ANW%!-d;OBz.!BB
g|$GH@d<.&wTOg,Qx!O*?*;TBO
BkEgkGBDO
Nu-(certificate). C:[8H!-xk0&Nu-R/Z
GID!YNeO)Nu-R/Z&NuRvV5OOBp
vP.-.Nu-BCA(Certificate Authority)!-_^UOY.
Nu(authentication). (1) C:[8H!-gkZID GBg
kZG @j'.W<:GQ;.NOBM. (2) C:[8H!
-^Cv!/fGBUsGvJRBv.NOBM. (3) C
:[8H!-$8C:[GB8#ZxGgkZ&.NO
kn77