Tool Mentor: TAM – Provide Access to Authorized User
TM019 – How to Provide Access to Authorized User
Tool: IBM Tivoli Access Manager
Relationships
Main Description

Context

Tool mentors explain how a tool can perform tasks, which are part of ITUP processes and activities. The tasks are listed as Related Elements in the Relationships section.

You can see the details of how processes and activities are supported by this tool mentor, by clicking the links next to the icons:

Details

IBM® Tivoli® Access Manager (TAM) provides a secure, policy-based resource access management solution that enables businesses to address the authentication and authorization of users who attempt to access resources throughout their environment. TAM has the facilities to provide these security protection mechanisms through the use of access control lists, protected object policies, and authentication policies.

Through centralized control, TAM grants organizations the ability to provide security protection mechanisms by dictating what users should be allowed to access on which resources. By defining a set of access control lists (ACLs), TAM grants or denies access to groups as well as individual users. Resources within the organization are organized into a tree, throughout which these defined rights cascade hierarchically. This organization allows for security protection mechanisms to be implemented throughout the environment quickly and efficiently. In case there are security breaches, all access to protected resources within an organization can be locked off to minimize potential risk. See Chapter 8: "Access Control List Management" in the IBM Tivoli Access Manager Base Administration Guide, version 5.1.

Another security protection mechanism is implemented through the use of Protected Object Policies (POPs). Protected object policies are assigned to specific objects within the resource hierarchy, and they apply security restrictions to objects regardless of which user is attempting to access them. The purpose of a POP is to impose access conditions on an object that is based on the time of the access and to indicate whether the access request should be audited. POPs also allow for varying levels of authentication depending on the method or origin of the authentication request by the user. If the origin of the request, for example, is located outside of a trusted network space, stronger authentication might be required for that particular access. Access of specific resources or objects can be set to be an auditable action or not through the use of POPs, which allows for fine-grain monitoring of the use of secured resources. See Chapter 9: "Protected Object Policy Management" in the IBM Tivoli Access Manager Base Administration Guide, version 5.1.

When the security protection mechanism relies on user attributes or on environmental factors, then IBM Tivoli Access Manager utilizes authorization rules. Authorization rules provide security protection mechanisms that are based on the attributes of a person or object and the context and environment surrounding the access decision. For example, an authorization rule can implement a time-of-day policy that depends on the user or group. Businesses can also use a rule to extend the security protection mechanism that ACLs can provide by implementing a more advanced policy, such as one based on quotas. While an ACL can grant a group permission to write to a resource, a rule can go a step further by examining if a group has exceeded a specific quota for a given week before permitting that group to write to a resource. See Chapter 10: "Authorization Rules Management" in the IBM Tivoli Access Manager Base Administration Guide, version 5.1.

For more information

For more information about this tool, see the IBM Tivoli Access Manager tool.