Subscribe: IBM developerWorks : Tivoli : Tutorials
http://www.ibm.com/developerworks/views/tivoli/rss/libraryview.jsp?type_by=Tutorials
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
apos  autonomic computing  autonomic  computing  data  ibm tivoli  ibm  manager  policy  resource  server  tivoli  tutorial  web 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: IBM developerWorks : Tivoli : Tutorials

IBM developerWorks : : Tutorials



The latest content from IBM developerWorks



Published: 24 Apr 2017 17:26:57 +0000

Copyright: Copyright 2004 IBM Corporation.
 



Solving problems in the DB2 pureScale cluster services environment

18 Aug 2011 04:00:00 +0000

This tutorial guides DBAs and system administrators in problem determination for DB2 pureScale cluster services. As you deploy IBM DB2 pureScale Feature for DB2 Enterprise Server Edition systems into production, you need to acquire appropriate problem determination skills. This tutorial provides information about gathering diagnostic information when failures occur, and provides additional information to aid in understanding the tightly integrated subcomponents of the DB2 pureScale Feature, such as the Cluster Caching Facility (CF), General Parallel File System (GPFS), Reliable Scalable Cluster Technology (RSCT), and IBM Tivoli Systems Automation for Multiplatforms (Tivoli SA MP).



Configuring global security in WebSphere Lombardi Edition V7.2 using Tivoli Directory Server V6.3

26 Jan 2011 05:00:00 +0000

Learn how to configure global security in IBM WebSphere Lombardi Edition V7.2 using an LDAP server. This helps enterprise users to log in and use the various applications in Lombardi Edition and allows the IT department better access control. This tutorial uses IBM Tivoli Directory Server V6.3 as the LDAP server and IBM DB2 as the database.



Using DB2 High Availability Disaster Recovery with Tivoli Systems Automation and Reliable Scalable Cluster Technology

30 Sep 2010 04:00:00 +0000

The DB2 High Availability (HA) feature, introduced in DB2 9.5, enables a new level of integration between the data server and cluster management software, providing a unified High Availability Disaster Recovery (HADR) automation framework. In this tutorial, get an introduction to this integrated solution, and learn about useful diagnostic tools for working with DB2 and Tivoli Systems Automation, a key piece of the solution. Achieve the highest possible level of performance and reliability for your data, understanding how to solve problems and address issues.



Using the LDAP wrapper with InfoSphere Federation Server

23 Sep 2010 04:00:00 +0000

The LDAP wrapper is a pure Java package that is based on InfoSphere Federation Server Java wrapper SDK technology. By providing read-only access to LDAP directory servers in an SQL environment, the LDAP wrapper facilitates the integration and connectivity between business data in a relational database and human resource data in the LDAP directory server.



Developing a custom Java module

12 Sep 2008 04:00:00 +0000

TFIM 6.2 provides an OSGi (Open Services Gateway Initiative) extension point for custom plug-ins for STS modules. In this tutorial, we will walk through the complete development process for creating a custom STS plug-in for Tivoli Federated Identity Manager (TFIM) 6.2. Customers might develop their own STS plug-ins for a variety of reasons including advanced user mapping and attribute gathering capabilities, or to support validation or issuing of proprietary security token types. This tutorial will use as a working example a simple mapping module which adds a configurable name/value parameter pair as an attribute to the TFIM Trust Service's STSUniversalUser.



Bulk attestation within Tivoli Identity Manager

04 Mar 2008 05:00:00 +0000

As part of compliance requirements, organizations are required to perform attestation of a user's entitlements for access to systems. This process usually requires a responsible party (for example, the user's manager) to assert that the user continues to require access to a particular system. IBM Tivoli Identity Manager (ITIM) provides account attestation as part of its core functionality, and hence can implement complex attestation requirements. However, setting the attestation for a large number of target systems can be a chore. In addition, when a responsible party is asked to perform attestation for many users of a system as part of a continuous attestation cycle, the task becomes laborious. This tutorial gives the reader some methods for scaling attestation from a manageability perspective, using features available within ITIM 5.0.






Deploy Red Hat across multiple computers using Tivoli Provisioning Manager for OS Deployment

22 May 2007 04:00:00 +0000

Any time you have employees, overhead costs are going to be substantial, especially when it comes to new hires. Of the many things new employees need, setting up their computer and its operating system, and installing and configuring appropriate applications is one of the most time-consuming. Tivoli Provisioning Manager for OS Deployment greatly reduces this overhead by allowing you to create and manage deployable images and any associated software packages efficiently through a Web interface. This tutorial shows you how to use Tivoli Provisioning Manager for OS Deployment to create installation images and manage packages for an actual deployment of RedHat Enterprise Linux.



Practical TAM Authorization API

26 Apr 2007 04:00:00 +0000

Learn simple use of the Tivoli Access Manager Java Authorization API to create a JSP which will display the TAM credential on a web application server running behind Tivoli Access Manager WebSEAL or the Tivoli Access Manager web plug-ins. This capability will essentially mirror the output of the "epac" CGI application that ships with the Tivoli Access Manager web runtime environment (except it will execute much faster!). A downloadable version of the final product is provided.



Setting up a secure Tivoli Access Manager Session Management Server environment

14 Dec 2006 05:00:00 +0000

This tutorial enables secure communication between all components within a Session Management Server (SMS) environment. This is essential in any SMS deployment, because without secure communication between all components of an SMS environment, anyone could inject false session data. This tutorial describes how to achieve security-rich communication using Tivoli Access Manager (TAM) certificates and custom certificates. The order of the tutorial gives the student an easy process for working from a simple to a complex configuration.



Create a WSDM interface for an HTTP server using Apache Muse

21 Nov 2006 05:00:00 +0000

Learn how you can use Apache Muse to create a WS-DistributedManagement (WSDM)-compliant interface for a manageable resource. In this tutorial, you'll see how to design the Web service interface for the resource, generate code for the implementation, and deploy the code as a Web application. The manageable resource focus of this tutorial is the ubiquitous Apache HTTP Server, commonly-referred to as "httpd." After completing this tutorial, you should have a Muse-based application that lets any WSDM-compliant management client manipulate the httpd resource.



Hit the ground running with AIDE, Part 1: Building a touchpoint

18 Apr 2006 04:00:00 +0000

This tutorial, the first in a series on the IBM Autonomic Integrated Development Environment (AIDE), shows how you can get up and running quickly with the IBM AIDE toolkit. Discover touchpoint creation, modification, and deployment and learn about the internals of the touchpoint in relation to the underlying model.



On demand provisioning of portal servers in a clustered environment, Part 5: Run the solution

07 Mar 2006 05:00:00 +0000

This series focuses on how the Advanced Design and Technology team uses IBM Tivoli automation products for rapid deployment of replicated and clustered portal servers. This tutorial, which is the final installment in the series, explains how to use the Portal Provisioning Automation Package and run the team's solution. It covers how to assign server roles, staging strategies for portal servers, using Tivoli Intelligent Orchestrator (Intelligent Orchestrator) to add or remove servers from the portal cluster, and migrating the automation package to Intelligent Orchestrator V3.1. Finally, you'll leave with a few thoughts about how to use the workflows to automate the deployment of other software components.



Create autonomic computing policies using Simplified Policy Language

14 Feb 2006 05:00:00 +0000

Simplified Policy Language (SPL) is a syntax for developing autonomic computing policies that can be understood by humans. Policy authoring without proper tools can be difficult because it requires a thorough knowledge of Extensible Markup Language (XML). SPL comes to the rescue by providing an easy syntax for creating policies. Streamline and simplify your policy creation with the Policy Management tool PMAC, which is downloadable from alphaWorks, so that you can experiment with creating policies. Administrators responsible for creating and maintaining the policies for an organization will benefit the most from this tutorial.



On demand provisioning of portal servers in a clustered environment, Part 4: Prepare to replicate and cluster

07 Feb 2006 05:00:00 +0000

This series focuses on how the Advanced Design and Technology team uses IBM Tivoli automation products for rapid deployment of replicated and clustered portal servers. This tutorial outlines how to set up Tivoli Intelligent Orchestrator in preparation for replicating and clustering portal servers. You'll learn how to install the WebSphere Portal Provisioning Automation Package and how to customize the data center model for automation. Defining potential target servers with Intelligent Orchestrator is also covered.



Streamline Common Base Event logging

03 Jan 2006 05:00:00 +0000

Common Base Event logging provides problem-determination data rich in activity and control-flow information that the Log and Trace Analyzer uses to accelerate problem determination and increase system serviceability and quality. This tutorial shows how to streamline Common Base Event logging instrumentation in the Java programming language to reduce complexity and instrumentation code size. You'll learn techniques and best practices that reduce maintenance requirements and let you increase customized, vendor-specific content.



Use Policy Management for Autonomic Computing

01 Jan 2006 05:00:00 +0000

This tutorial shows how to use the Policy Management for Autonomic Computing (PMAC) tool, downloadable from alphaWorks, to prepare an application to receive policy guidance. This tutorial has been updated to match the Policy Management for Autonomic Computing Version 1.2.1.



Problem determination made easy, Part 1: Configure the Generic Log Adapter and Autonomic Management Engine for Web services

06 Dec 2005 05:00:00 +0000

Learn how to combine the Autonomic Management Engine (AME) and Generic Log Adapter (GLA) to perform problem determination in a real world example using IBM WebSphere Application Server V5 and IBM DB2 8.1. This tutorial shows how to develop, install, and configure AME and GLA for using Web services, which let you send Common Base Events asynchronously. It also has an overview of the new Common Manageability Model (CMM)-based resource models, and how to develop one using the Resource Model Builder.



Developing a Faces JSR 168 portlet using IBM Rational Application Developer 6.0 for autonomic computing

11 Oct 2005 04:00:00 +0000

This tutorial guides you through the process of developing a simple Java Specification Request (JSR) 168 portlet using IBM Rational Application Developer 6.0. It includes detailed instructions on building portlet user interfaces (UI), creating data JavaBeans, binding the data, handling the interactions, using resource bundles, and exporting the portlet to the Integrated Solutions Console. The Integrated Solutions Console is a component inside of the IBM Autonomic Computing Toolkit, which you can download at no charge.



Policy Management for Autonomic Computing: Solving a business problem using PMAC

20 Sep 2005 04:00:00 +0000

Businesses of all types have policies that dictate the behavior of their IT resources, human resources, business rules, and so on. Policy Management for Autonomic Computing (PMAC) provides a mechanism and environment for creating and enforcing policies and automating these business scenarios. By using PMAC in this manner, your business will run more efficiently and with less process errors.



Learn how to use the Generic Log Adapter for formatting events from within your programs

13 Sep 2005 04:00:00 +0000

The Generic Log Adapter can be looked at as a set of JAR files or libraries that can be called from within your code to perform continuous or one time conversion of native logs into the Common Base Event format. This tutorial will explain how you can invoke the Generic Log Adapter in such a manner and capture the output back into your code. In addition, it will guide in making dynamic reconfigurations of the GLA engine at runtime which expands the scope of use of the GLA within your own programs.



Policy Management for Autonomic Computing: Write a complete XML policy using Policy Management for Autonomic Computing

06 Sep 2005 04:00:00 +0000

The crux of an IT Administrator's job is to be able to control the behavior of managed resources. By using policy documents in concert with the Policy Management for Autonomic Computing (PMAC) component, the IT professional is able to manage resources quickly and efficiently.



Configure network quality of service to manage application performance through service level agreements on z/OS

19 Jul 2005 04:00:00 +0000

This tutorial shows how to manage application performance using the Policy Based Network Quality of Service (PBN QoS) and the network QoS Service Level Agreement (SLA) data collection functions on z/OS. TheQoS SLA data collection function is available in IBM Communications Server for z/OS V1R5. This solution uses the autonomic control loop, which is made up of four functions: monitoring, analyzing, planning, and executing.



Using the ACPolicy API

21 Jun 2005 04:00:00 +0000

This tutorial shows how to use the Policy Management for Autonomic Computing (PMAC) ACPolicy application programming interface (API) , downloadable from alphaWorks, to create, change, and validate an autonomic policy document.



Using the Managed Element Descriptor API

31 May 2005 04:00:00 +0000

This tutorial shows how to use the Policy Management for Autonomic Computing (PMAC) Managed Element Descriptor (MED) application programming interface (API), downloadable from alphaWorks, to gather the desired data from a managed resource to aid in the enforcement of autonomic policy.



Globalizing an Integrated Solutions Console portal application

15 Mar 2005 05:00:00 +0000

The world of autonomic computing is a global world. Developers need to be ever conscious of global issues in designing user interfaces and in making their applications available to the international marketplace. The Integrated Solutions Console enables the common systems administration feature of autonomic computing. Internationalizing one's portlet application opens up common systems administration to administrators not just around the country but around the world.



Autonomic Computing Expression Language

28 Feb 2005 05:00:00 +0000

This tutorial shows how to use Autonomic Computing Expression Language (ACEL) in your XML document. It takes a user step-by-step through the process of creating an XML document with ACEL expressions, parsing the XML document, and evaluating ACEL expressions contained in the XML document.



Create custom sensors and outputters using Release 2 of the Autonomic Computing Toolkit

04 Jan 2005 05:00:00 +0000

The Generic Log Adapter provides a way to read any log, monitor it for events, extract information from those events, and output the results. It provides an architecture that enables you to customize the components that provide these functions. An earlier tutorial showed you how to create a very basic component, an outputter that sends events to Standard.out. Now we'll show you how to create a sensor component that checks for events reported through e-mail and an outputter that sends an e-mail notification if it finds any.



Debugging Tivoli UNIX resource models

10 Sep 2004 04:00:00 +0000

This tutorial provides a step-by-step example of how to debug an IBM Tivoli Monitoring (ITM) resource model using the Resource Model Builder Debugger for UNIX. It guides you through the process of finding and fixing an ITM resource model with a simple logic error.



Model your data center

08 Jun 2004 04:00:00 +0000

This tutorial provides an overview of IBM Tivoli Intelligent ThinkDynamic Orchestrator and describes the data center model, a virtual model of your data center. This tutorial introduces you to the product, along with some of the end-to-end concepts and the relationships that exist within the data center. You'll see two different ways to set up a data center model with Tivoli Intelligent ThinkDynamic Orchestrator: by using the graphical interface, and by importing structured XML documents.



Self-optimizing storage allocation

24 Feb 2004 05:00:00 +0000

With applications and data consuming growing amounts of space, and storage administrative staff spends an increasing amount of time allocating new storage. Tivoli Storage Resource Manager and ESS deliver self-optimizing capabilities with their LUN provisioning capabilities, which can extend file systems and provision LUNs as new storage is needed. The intent with this automation in place, is for storage admin staff to spend less time allocating storage and more time actively managing storage. This tutorial describes the automation options offered by ESS and IBM Tivoli Storage Resource Manager.



Create an administrative suite

19 Feb 2004 05:00:00 +0000

One of the core deliverables for autonomic computing is provision of a common administrative process across platforms and products. The Integrated Solutions Console is a first step in both product and process. In this tutorial, you will see first how the Integrated Solutions Console can be used to administer different products using a single Web based console. The dependencies required to successfully run a deployed component will be detailed and the mechanism for controlling access to the components will be described. Finally we will review the process for creating an Integrated Solutions Console component that performs administrative functions.



ITM resource model creation

22 Sep 2003 04:00:00 +0000

IBM Tivoli Monitoring (ITM) is a powerful environment that gives you the ability to monitor virtually any type of resource. This tutorial shows you how easily you can build custom monitoring capabilities into ITM using the ITM Resource Model Builder. Resource Models provide a structured environment to provide resource status analysis, notification of significant events, and even automatic corrective measures. ITM Resource Model Builder is an IDE that simplifies the process of creating and debugging Resource Models.



User provisioning with Tivoli Identity Manager

12 Sep 2003 04:00:00 +0000

The process of creating user accounts and permissions for employees on a diverse array of computers can potentially consume much of an IT department's time and resources. In this tutorial, you'll learn how IBM Tivoli Identity Manager, working in conjunction with other Tivoli products, can help streamline the user provisioning process. You'll build a sample application that automatically creates user accounts with appropriate permissions based on data entered into a human resources database. The resulting environment also helps the establishment of single sign-on authentication for the newly provisioned users.



Installing Tivoli Access Manager on Linux

08 Aug 2003 04:00:00 +0000

Linux is quickly becoming a dominant platform for e-business and enterprise applications. The recent release of IBM Tivoli Access Manager 4.1 Fixpack 2 recognized this fact by adding support for Linux on the Intel platform. In this tutorial, you'll learn how to install and configure IBM Tivoli Access Manager 4.1 on Linux. You'll also walk through some simple steps that will test your installation, including the creation of a WebSEAL junction.



Secure your Web resources

29 May 2003 04:00:00 +0000

This tutorial drives through three WebSphere Application Server/Tivoli Access Manager integration scenarios. You'll learn how to share the user registry, and to protect Web resources with WebSEAL via both LTAP and TAI. Setup and configuration details are provided for testing and configuring all the scenarios in the tutorial.



Real-time Web site data collection

06 May 2003 04:00:00 +0000

Do you have a high-traffic Web site and need to analyze the viewing habits of your visitors? You may have noticed that it is difficult to keep up with data volume and need more timely access to data than you can get by using logs and batch processing. In this tutorial, you'll learn how to implement a dynamic page-level data capture method using Tivoli Web Site Analyzer's Web Tracker. Web Tracker collects data in real time from visitors as they use a Web site and returns it to the database for immediate processing. This method allows you to gather information on Web site visitor behavior and the client (browser) environment which is not available through standard Web log processing.



Toughen Web application security

01 May 2003 04:00:00 +0000

Carelessly chosen passwords have made many password-protected systems vulnerable to outside attack. This tutorial shows you how you can use Tivoli Access Manager WebSEAL to build a multiphased authentication system that locks Web applications down more tightly. The tutorial includes sample C code that you can use as a basis for your own applications.



Secure your Web server

23 Jul 2002 04:00:00 +0000

Secure a Web server against unauthorized access. This tutorial covers physical security, the importance of firewalls, correct application installation, file permissions, application configuration, and techniques that allow Web page maintainers to do their job without sacrificing system integrity.



General computer security

12 Dec 2000 05:00:00 +0000

Get an overview of the security process surrounding computer systems.