The Sun Java System Access Manager 7.1 Deployment Planning Guide provides planning and deployment solutions for Sun JavaTM System Access Manager based on the solution life cycle.
Access Manager is a component of the Sun Java Enterprise System (Java ES), a set of software components that provide services needed to support enterprise applications distributed across a network or Internet environment.
This book is intended for deployment architects and business planners responsible for the planning, analysis, and design of an Access Manager deployment. This book might also be useful for system integrators who are responsible for the design and implementation of the specific aspects of an Access Manager deployment.
Readers should be familiar with the following components and concepts:
Access Manager technical concepts, as described in the Sun Java System Access Manager 7.1 Technical Overview
Deployment platform: SolarisTM, Linux, HP-UX, or Windows operating system
Web container that will run Access Manager: Sun Java System Application Server, Sun Java System Web Server, BEA WebLogic, or IBM WebSphere Application Server
Technical concepts: Lightweight Directory Access Protocol (LDAP), Java technology, JavaServer PagesTM (JSP) technology, HyperText Transfer Protocol (HTTP), HyperText Markup Language (HTML), and eXtensible Markup Language (XML)
This guide is based on the solution life cycle, which describes the various phases of deployment planning. Chapter 1, Introduction to Deployment Planning for Access Manager provides a description of the solution life cycle.
Related documentation is available as follows:
The following table describes the Access Manager documentation set, which is available on the following web site:
http://docs.sun.com/coll/1292.2
Table P–1 Access Manager 7.1 Documentation Set
Title |
Description |
---|---|
Sun Java System Access Manager 7.1 Documentation Center |
Provides links to commonly referenced information in the Access Manager 7.1 documentation collection. |
Describes new features, problems fixed, installation notes, and known issues and limitations. The Release Notes are updated periodically after the initial release to describe any patches, new features, or problems. |
|
Explains basic Access Manager concepts and terminology and provides an overview of how Access Manager components work together to consolidate access control functions and to protect enterprise assets and web-based applications. |
|
Sun Java System Access Manager 7.1 Deployment Planning Guide (this guide) |
Provides planning and deployment solutions for Access Manager based on the solution life cycle. |
Provides information about configuring Access Manager after installation. Usually, you perform postinstallation tasks only a few times. For example, you might want to deploy an additional instance of Access Manager or configure Access Manager for session failover. |
|
Describes various administrative tasks such as realms management, policy management, authentication, and directory management. |
|
Provides reference information for the Access Manager command-line interface (CLI), configuration attributes, AMConfig.properties attributes, serverconfig.xml file attributes, log files, and error codes. |
|
Sun Java System Access Manager 7.1 Federation and SAML Administration Guide |
Provides information about Federation Manager based on the Liberty Alliance Project specifications. It includes information on the integrated services based on these specifications, instructions for enabling a Liberty-based environment, and summaries of the application programming interface (API) for extending the framework. |
Provides information about customizing Access Manager and integrating its functionality into an organization’s current technical infrastructure. It also contains details about the programmatic aspects of the product and its API. |
|
Provides summaries of data types, structures, and functions that make up the Access Manager public C APIs. |
|
Provides information about the implementation of Java packages in Access Manager. |
|
Provides information about how to tune Access Manager and its related components for optimal performance. |
|
Sun Java System Access Manager Policy Agent 2.2 User’s Guide |
Provides an overview of Policy Agent software, including the web agents and J2EE agents that are currently available. To view the Access Manager Policy Agent 2.2 documentation collection, see: |
The following table provides links to documentation collections for related Java ES products.
Table P–2 Related Sun Java Enterprise System 5 Documentation
Product |
Link |
---|---|
Sun Java Enterprise System 5 | |
Sun Java System Directory Server Enterprise Edition 6.0 | |
Sun Java System Web Server 7.0 | |
Sun Java System Application Server Enterprise Edition 8.2 | |
Sun Java System Message Queue 3.7 UR1 | |
Sun Java System Web Proxy Server 4.0.4 | |
Sun Java System Identity Manager 7 |
Besides searching Sun product documentation from the docs.sun.comSM web site, you can use a search engine by typing the following syntax in the search field:
search-term site:docs.sun.com |
For example, to search for “broker,” type the following:
broker site:docs.sun.com |
To include other Sun web sites in your search (for example, java.sun.com, www.sun.com, and developers.sun.com), use sun.com in place of docs.sun.com in the search field.
Third-party URLs are referenced in this document and provide additional, related information.
Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through such sites or resources.
The Sun web site provides information about the following additional resources:
The following table describes the typographic conventions that are used in this book.
Table P–3 Typographic Conventions
Typeface |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories, and onscreen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 |
What you type, contrasted with onscreen computer output |
machine_name% su Password: |
aabbcc123 |
Placeholder: replace with a real name or value |
The command to remove a file is rm filename. |
AaBbCc123 |
Book titles, new terms, and terms to be emphasized |
Read Chapter 6 in the User's Guide. A cache is a copy that is stored locally. Do not save the file. Note: Some emphasized items appear bold online. |
The following table shows the default UNIX® system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P–4 Shell Prompts
Shell |
Prompt |
---|---|
C shell |
machine_name% |
C shell for superuser |
machine_name# |
Bourne shell and Korn shell |
$ |
Bourne shell and Korn shell for superuser |
# |
Sun is interested in improving its documentation and welcomes your comments and suggestions.
To share your comments, go to http://docs.sun.com and click Send Comments. In the online form, provide the document title and part number. The part number is a seven-digit or nine-digit number that can be found on the title page of the book or at the top of the document.
For example, the title of this book is Sun Java System Access Manager 7.1 Deployment Planning Guide, and the part number is 819-4672.