System management addresses the administration of the IT environment, including the control and operation of the network infrastructure, servers, clients and pervasive devices.
IBM's integrated security solutions that combine IBM Tivoli® security software with IBM pSeries® servers can help you address the heightened and growing need for a highly secure on demand environment.
Web-based System Manager security is optionally installable software that provides for the secure operation of the Web-based System Manager in client-server mode. It is based on public key cryptography, the SSL (Secure Sockets Layer) protocol and standard AIX log-in security.
Cluster and distributed systems management
- AIX cluster software documentation
IBM Cluster Systems Management (CSM) for AIX is designed for simple, low-cost management of distributed and clustered IBM Power Systems in technical and commercial computing environments. CSM allows system administrators and operators to manage distributed Power Systems/AIX servers located in geographically distant data centers. It also provides management of clustered Power Systems/AIX located in the same facility (including hardware control, such as power on and off, of properly configured servers). CSM exploits IBM Reliable Scalable Cluster Technology for AIX. CSM and RSCT product guides contain sections on security within their cluster and systems management domains.
- IBM Tivoli security management
IBM Tivoli security management solutions address two critical e-business challenges: automated identity management and security event management. The IBM Tivoli identity management solution helps you quickly realize ROI by bringing users, systems and applications online fast, while effectively managing users, access rights and privacy preferences throughout the identity lifecycle. The IBM Tivoli security event management solution helps you actively monitor, correlate and quickly respond to IT security incidents across your e-business. Securely manage and enable access to your on demand computing resources with Security Management solutions from Tivoli software.
Trusted computing base (TCB)
This commands reference shows how to use the tcbck command to audit the security state of your system.
This IBM Redbook contains information about the first official release of the new clustering software IBM Cluster Systems Management (CSM) on AIX 5L Version 5.2, including a complete set of base security functions based on IBM host-based authentication (HBA) and offered through an abstraction layer in the CSM software.