The best approach would be to use single-sign on (SSO). SSO accomplishes both tasks at once – synchs your Windows...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
passwords to your iSeries back-end and synchs the iSeries passwords for multiple systems to each other.
Fortunately, IBM has upgraded iSeries in recent years to include Kerberos functionality, which can be used for authentication in Windows 2000, 2003 and XP. Kerberos makes it easier to merge the two disparate systems – Windows, a distributed PC-based network system, and iSeries, a mainframe system – into a common authentication set up.
Kerberos requires a Key Distribution Center (KDC) for creating, managing and distributing the keys used in authentication systems, SSO or otherwise. Both domain controllers can host the KDC now that iSeries has KDC functionality with the release of i5/OS V5R3, formerly known as OS/400.
Your Windows clients will need iSeries Access for Windows or iSeries Navigator to hook up to the iSeries to complete the SSO implementation. One fundamental problem with SSO links between Windows and iSeries occurs when combining the registries used by each to store user authentication information. However, iSeries uses Enterprise Identity Mapping (EIM), a new technology developed by IBM starting with the V5R2 release to solve this problem.
Obviously, SSO deployments can be quite complicated and require a thorough understanding of your network architecture, applications and user needs and habits.
Dig Deeper on Password Management and Policy
Related Q&A from Joel Dubin
After a server room door has been compromised, finding a more secure solution is of utmost importance. Learn how to choose a server room door that ...continue reading
In the IAM world, what's the difference between access control and identity management. This IAM expert response explains how the two relate as well ...continue reading
When working with PeopleSoft and Unix, which single sign-on (SSO) vendors offer the most effective products? Learn how to choose an SSO product in ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.