b'XgkOBAN<:.

Y_dRNu

,

W.v)b]N

u

(authentication) W

\h0Nu

(authentication) |6
N8L2U.-q:(entitlement service). A0C^GB6G
<.G\NR:NNMN8L2U.&.OOb'XgkRv
VBGQAPI 18SC/WN.N8L2U.B8k/$f
D8NZx|.ZnC.ILG!-RqOE**_!GQA
N<:!-gkOb'XA0C^GGQ$8!_!RnC
.ILG/$%LMTOY.m4:GQADK&gkO)L
/Q-q:&3_RvV@OY.
N8L2U.(entitlement). \N-H8Hpolicy $8&wT
OB%LM86.GQ!B/$nC.ILG8NLXR vV
BfD8N|D-HbIGBpolicy %LM!V@OY.
NM]ANd]:(Internet suite of protocols). NM]!-
gkOb'X3_GnIETF(Internet Engineering Task Force)
&kXRFC(Requests for Comment)Nx3HANd]<.
Z
Z?3!(silent installation). ^Cv&\V!8;vJv8
kENWDO!^CvM@y&zeOB3!.GQZ?3
!!-B%LMTB;'X@dDO; gkRvV@OY.

@dDO

(response file) |6
Zx@j'.(resource object). G&W.v)Zx(9:-q
:,DOWANW%)G%C
Z<nO(self-registration). gkZ!JdQ%LM&TBR
vVm|.ZG |)xLnOHTivoli Access Manager g
kZ!IvVBAN<:
"Ln(suffix). NCN8/OBp:d.h~86!-G'
Wq;D0OB80L'. LDAP(Lightweight Directory
Access Protocol)!-gkGBsk{L'v$ fD8NNX,
L"LnBp:d.h~86;GY%pgWq!{kK
OY.p:d.-v!BNCN8/GBp:d.h~86"
";D0OB)/3G"Ln!V; vV@OY.
6!(action). ACL(Access Control List) GQS:.
ACL(Access Control List) |6
+
AWLJ@j'.(container object). @j'.x#;05G
bIregion!8:OB86{v$
m0(cookie). -v!,sLp.C:[!zeOmDS<G
!-W<:OB$8.m0B-v!,sLp.!kQ/$$
8&boRvVTUOY.
)b6$ !I(scalability). Zx! W<:OBgkZvGu
!!@dOb'QW.v)C:[bI
0%LM#L:DO(key database file).

05

(key ring) |
6
05(key ring). C:[8H!-xk0,3Nk0,EZ:
VBg.WNu;wTOBDO
0V(key pair). C:[8H!-xk0W3Nk0.O
#-!0V;gkR',[EZBxk0&gkO)^C
v&O#-Om,vEZB3Nk0&gkO)^Cv&O#
X6UOY.-m!0V;gkR',-mZB3Nk0&g
kO)^Cv%C&O#-Om,vEZBxk0&gkO)
-m.N; 'X^Cv%C&O#X6UOY.
0DO(key file).

05

(key ring) |6
0(key). C:[8H!-%LMO#- WO#X6;'X
O#- Km.r!-gkOBOCGb#.

3Nk0

(private
key) W

xk0

(public key) |6
8
d+(token). (1) YE.kEA!-:WLGLSCN|[E
<&nO!V=; %COb'X%LM:WLG#!,S
{8N|^GBGQb#.""G%LM:WLG!BE<&
&nOb'Xd+;9fOmgkRb8!V@OY.d+:
|[GQ;K.B/$^CvGBq.POTOY. (2) Y
E.kEA(LAN)!-|[E<MT2pYL:#!|^G
Bq.Cv:.d+!%LM!_!Hfl,Ld+:A9
SL KOY.
D
wP(portal). /$gkZG W<:GQ;b]8N,/$g
kZ!gk!IQ%Zx(9:5),;kGB-q:)Gg
kZ$GqO;?{8N[:OBkU%gL.
z5(polling). %LMG|[)N&a$Ob'X%LM#L
:&$b{8N6gOBAN<:
78 IBM Tivoli Access Manager for e-business: BEA WebLogic Server kUH;-