Title: Security
1Security Storage Management using Tivoli
Wrap up!Part 1 2
2Agenda
- Part 1
- Few Security Concepts
- Security Management Portfolio
- Tivoli Identity Manager
- Tivoli Access Manager
- Part 2
- Storage Management Portfolio Concept
- Tivoli Storage Manager Express
- Tivoli Continuous Data Protection for files
3Tivoli Software Pillars
- Infrastructure management products
- Storage
- Tivoli Storage Manager
- No dependencies on any of the other Tivoli
products - Integration points with the other Tivoli products
- Security
- Identity Access Management
- Automation
- Performance, Availability,Configuration and
Operations
4Security Management
5Authentication
- Authentication
- The process of identifying an individual who is
attempting to log in to a secure domain - The process of linking a person or process with
his or her electronic identity - It gives the answer on the question
- Who are you?
6Authorization
- Authorization
- The act of determining what resources an
authenticated user can access or - The Process of deciding whether a particular user
can perform a requested action on a given point - In a simplest form authorization provides you
with a yes or no answer to this question - Are you authorized (do you have permission) to
access/manipulate the requested object?
7AuditingIntegrityPrivacy
- Auditing
- The recording of the system events
- Integrity
- The ability to tell if a message has been altered
since it was sent - Privacy
- The ability to exchange messages without a third
party being able to read them
8User Registry
- A database of the user identities that are known
to access manager - A representation of groups in access manager that
users have membership with - A data store of metadata required to support
additional functions - The default user registry is LDAP-based, and
Access Manager consolidates its registry support
around a number of LDAP directory products
9User Registry
- Access Manager can use the following directory
products for its user registry - IBM Tivoli Directory Server
- Novell eDirectory
- Sun Java System Directory Server
- Microsoft Active Directory
- IBM Lotus Domino Server
- IBM z/OS LDAP Server
- The IBM Tivoli Directory Server is included with
Access Manager and is the default LDAP directory
for implementing the user registry
10Directory Information Tree (DIT)
- An LDAP-based user registry stores its data as
objects and organizes it hierarchical in a tree
structure called the Directory Information Tree
(DIT). - An LDAP-based user registry can have multiple
DITs. - Objects are described with various attributes.
11DIT
- The user registry for Access Manager contains
threetypes of objects - User objects, which contain basic user
attributes. - Group objects, which represent roles that user
objects may be associated with. - Access Manager metadata objects, which contain
special Access Manager attributes that are
associated with user and group objects. The
metadata includes information that helps linking
an Access Manager user ID to its corresponding
registry user object
12PKI Public Key Infrastructure
- Public-key infrastructure provides public-key
encryption and digital signature services - The purpose is to manage keys and certificates
- PKI enables the use of encryption and digital
signature services across a wide variety of
applications
13Identity, Risk and Compliance Management
Federated Identity Manager
Security Compliance Manager
Risk Manager
14Identity, Risk and Compliance Management
Federated Identity Manager
Security Compliance Manager
Risk Manager
15Tivoli Identity Manager Overview
Identity change (add/del/mod)
Tivoli Identity Manager
HR Systems/ Identity Stores
16Tivoli Access Manager Family
- IBM Tivoli Access Manager for e-business (ITAMeb)
- Tivoli Access Manager for Business Integration
(ITAMBI) - Tivoli Access Manager for Operating Systems
(ITAMOS)
17ITAMeb - Core Components
- A user registry
- An authorization service consisting of an
authorization database and an authorization
engine that performs the decision making action
on the request. - Resource Manager (WebSEAL) responsible to
apply security policy to resources
18Tivoli Access Manager for e-business
BEFORE
- Too many passwords to remember
- Multiple admins with multiple access control
tools - User and access control information everywhere
- Compliance? To what?
Figure 1. Unified, Policy-Based Security for the
Web
Security policy
User group info
Audit
19Java API for Access Manager
- The IBM Tivoli Access Manager Runtime for Java
component includes the Java language version of a
subset of the Tivoli Access Manager API - The authorization API consists of a set of
classes that provide Java applications with the
ability to interact with Tivoli Access Manager to
make authentication and authorization decisions
20Access Manager based Authorization for MS.net
- IBM Tivoli Access Manager provides integration
and support for implementing Access Manager-based
authorization for Microsoft .NET applications. - Access Manager APIs are exposed at the .NET
Common Language Runtime level. - This exposes the functionality to all .NET
languages such as Managed C, C, and Visual
Basic .NET.
21IBM Global Security Kit(GSKit)
- Tivoli Access Manager Components communicate in a
secure way over the network - Tivoli Access Manager provides data encryption
through the use of the IBM Global Security Kit
(GSKit)
22Authentication and single sign-on mechanism
- Authentication describes the process of
exchanging credentials to identify the
communication partners. Authentication can be
directional or mutual - Single sign-on is the process of forwarding
information about a users identity in a secure
way to another system
23Links
- http//www.ibm.com/software/tivoli/
- http//www.ibm.com/software/tivoli/solutions/secur
ity/ - IT System Security Management
- http//www.redbooks.ibm.com/abstracts/redp4107.htm
l?Open
24For EDUSAT Coordinators
- Please send the session wise attendance sheets
to - ibmvtu_at_gmail.com
- Students post your questions _at_
- http//forum.vtu.ac.in
- Thank You!
25Storage Management
26What is Storage Management
- Centralized administration for data and storage
- Efficient management of information growth
- High-speed automated server recovery
- Customized backup solutions for major groupware,
enterprise resource planning (ERP) applications,
and database products - Data protection
- Disaster recovery
27IBM Tivoli Storage Manager Portfolio
- Tivoli Storage Manager base products
- IBM Tivoli Storage Manager
- LAN Clients, base libraries (notgt3 drives, 40
slots) - IBM Tivoli Storage Manager Extended Edition
- Tivoli Disaster Recovery Manager, NDMP NAS, Large
Libraries - IBM Tivoli Storage Manager for Data Retention
- Tivoli Storage Manager complementary licenses
- IBM Tivoli Storage Manager for Space Management
(HSM), - IBM Tivoli Storage Manager for SANs (LAN-free
clients) - IBM Tivoli Storage Manager for System Backup and
Recovery (AIX) - IBM Tivoli Storage Manager for .(Database, Mail,
Hardware, Application Servers, Enterprise
Resource Planning) - Oracle, MS SQL MS Exchange, Domino, ESS, WAS, R/3
- Third party and complementary products
- IBM DB2 backup, IBM Informix backup, IBM Content
Manager
28IBM Tivoli Storage Manager
- Complete Storage Management
- backup / restore
- archive / retrieve
- disaster recovery
- Hierarchical space management (hsm)
- database and application protection
- bare machine recovery
- data retention
- Scaleable from PC servers through UNIX and
mid-range servers to OS/390 mainframe servers - Heterogeneous platform coverage for 13 different
operating environments
http//www-3.ibm.com/software/tivoli/solutions/sto
rage/
29IBM Tivoli Storage Manager Architecture
Administration
User Interface
WEB
Local Area Network
Log
Database
Storage
Repository
Servers, Clients, Application systems
Storage Area Network
TSM Server
TSM Storage pools
TSM Clients
30Backup / Restore
BACKUP
TSM Client
RESTORE
TSM Server
DB
- Progressive / selective / adaptive subfile
differencing / point-in-time / volume level - Multiple versions kept
- Policy managed
- System assisted restore
- Automated scheduling
Hard Disk
Single File
Data Protection
31Archive / Retrieve
Archive
TSM Client
Retrieve
TSM Server
DB
- Long-term storage
- Point in time copy
- Retention period
- Policy managed
Audit
Records Retention
32Tivoli Disaster Recovery Manager
Source TSM Server
Target TSM Server
Copies
DB
DB
DB
Recovery Plan File
- Automatically generated disaster recovery plan
- Detailed tracking of off-site volumes
Business Continuity
33IBM Tivoli Storage for Space Management
Migrate
TSM Client
Recall
TSM Server
DB
- Migrates inactive data
- Transparent recall
- Policy managed
- Integrated with backup
Cost/Disk Full Reduction
Efficient Use of Storage
34Database and Application Protection
DB
Backup
TSM Client
Restore
TSM Server
- Online (hot) backup
- Incremental backup
- Data integrity
- Automation and Scheduling
- Seamless integration
DB
Online Backup
35Tivoli Storage Managers Bare Machine Recovery
- Brings back system to state of last backup
- Recovers all the OS changes and customizations
- Streamlines and automates the OS recovery process
- Eliminates the need for highly skilled
professionals to manually reinstall hardware,
network, patches - Speeds up the recovery time
- Integrates bare machine backups directly to
Tivoli Storage Manager server
- Ensure business continuance
- Reduce administrative costs
- Maximize current hardware investment
36Progressive Incremental Backup
- ONLY new or changed files backed up
- NO redundant backups
- Restores dont require the same file to be
restored multiple times - NO wasteful weekly full backups and their
dependent incremental/differential - Data tracked at file level
- Accurate restores
Monday
Tuesday
Friday
Wednesday
Thursday
A1
A2
A
B
B1
B3
B2
C
C3
C1
C2
D
D1
A1 B1 C1 D1
C3
B2 C2
A2
B3
Full Incremental
5 Tapes 9 Files
A1 B1 C1 D1
A2 B2 C2
A2 B2 B3 C2 C3
Full Differential
B2 C2
A2 B2 C2 C3
2 Tapes 9 Files
A1 A2 B1 B2 B3 C1 C2 C3 D1
Progressive Backup
1 Tapes 4 Files
37Policy Management
TSM Server
DB
- Centrally defined polices
- What data?
- Where to store it?
- How long to keep it?
- File-Level granularity
- Changes retroactively applied to already backed
up data
Domain 2
Domain 1
38Storage Hierarchy
TSM Server
Disk pools
- Storage pool virtualization
- Parallel backup of multiple clients
- Mixed retention on same tape
- Direct restore from tape to client
- Fast, direct restore from disk to client
- Scheduled migrations
- Automatic migration to new tape technology
- Automatic migration to tape outside of backup
window
Optical pools
DB
Tape pools
39Tape Reclamation
- Better utilizes tapes, thus, saving money
- Tape utilization constantly monitored
- User-defined reclamation threshold
- When free space reaches threshold
- Tape is mounted
- Valid data moved to another tape
- Original tape is returned to the scratch pool
- Can be scheduled to occur at specified times
100
40Collocation
- Reduces tape mounts on restore, thus, expediting
restores - Stacks all data for a client , file system or
group of clients onto the same tape or group of
tapes
Hi Threshold
Disk Pool
A
C
A
B
B
B
Lo Threshold
C
A
B
Migration
Migration
Client A
A
Client A
Client B
Client C
Client B
B
Tape Pool
B
B
B
C
A
A
A
C
C
Client C
C
B
41Operational Reporting
- Tivoli Storage Manager server(s) status reports
sent directly to you - Customized reports
- Daily report
- Scheduled monitoring report
- Status of backup report to end user
- Reports available via
- Email
- Desk top alerts
- Pages
- TSM Microsoft Management Console
- Export to a website
- Preconfigured reports based on best practices
- Utilizes information that has always been
available in the Tivoli Storage Manager db - Customize reports to fit your companys needs
42Enterprise Storage Management
IBM Tivoli Storage Manager is a lot more than
just a backup tool...
IBM Tivoli Storage Manager
LOG
DB
log
A single, integrated storage management
architecture Many non-priced base features web
GUIs, archive, encryption, mobile backup
43TSM Express
44Continuous Data Protection
45Why is CDP for Files Needed?
- Most data protection solutions miss the most
valuable data (what the user is working on now) - Daily backup allows too much productivity loss
- WORSE, 70 of corporate data resides on
desktops/laptops and fewer than 8 are backed-up
at all - End-users everywhere simply do not backup
because no solution has been as transparent as
air bags, until now
46Why is CDP for Files Needed?
- Increases in data volumes increase length of
backup window - Business and regulatory requirements for data
continuity are increasing - Disk costs declining making replication
technologies more cost effective - Critical data assets found in remote offices,
laptops, desktops often not protected - Employee productivity declines due to data loss
which is a growing concern - Many data protection solutions miss the most
valuable data (what the user is working on now)
- Companies would like to improve backup/recovery
time - 70 of corporate data resides on desktops/laptops
and fewer than 8 are backed-up. IDC Gartner
studies - 30 of small businesses have no formal data
protection procedure. Imation April 2003 - 40 of small businesses rank automated data
backup and recovery as their primary IT need. ECT
News Network - Disk costs declining making replication
technologies more cost effective - Replication and backup will increasingly overlap
47What is IBM Tivoli Continuous Data Protection for
File?
An evolution in data protection using a unique
hybrid approach
Replication Traditional Backup CDP
- Real-time true CDP
- Optional scheduled protection
- Tolerant of transient networks
- Versioning of files
- Point-in-time restore
- Archive retention WORM Disk
- Scalable
- Transparent
- Small foot print
- Single endpoint
- No server component required
- Multiple targets, flexible backend
- Maintain Native file format
- Open architecture
- 10 patents filed
48(No Transcript)
49For EDUSAT Coordinators
- Please send the session wise attendance sheets
to - ibmvtu_at_gmail.com
- Students post your questions _at_
- http//forum.vtu.ac.in
50