Previous Contents Index Next
List of Figures Figure 1-1 Building Blocks of an Identity Management Solution Figure 2-1 Security Requirements of Data and Services Figure 3-1 Access Manager 6 2005Q1 Functional Architecture Figure 5-1 Multiple Access Manager Instances With One Directory Server Figure 5-2 Simple Web Deployment Scenario Figure 5-3 Java Application Deployment Figure 5-4 Single Supplier Replication Figure 5-5 Multi-Supplier Configuration (also known as Multi-Master Replication) Figure 5-6 Multi-supplier Replication With Load Balancer Figure 5-7 Access Manager Session Failover Deployment Scenario 1 Figure 5-8 Access Manager Session Failover Scenario 2 Figure E-1 Access Manager Configuration With Load Balancer Figure E-2 Creating Nodes With Resonate Figure E-3 Creating a new Virtual IP Address Figure E-4 Configuring HTTP Scheduling Rules Figure E-5 Configuring Nodes With CDMaster Figure E-6 Configuring a Cookie Persistence Scheduling Rule Previous Contents Index Next Part No: 817-7644-10. Copyright 2005 Sun Microsystems, Inc. All rights reserved.
Part No: 817-7644-10. Copyright 2005 Sun Microsystems, Inc. All rights reserved.