Feedback

IBM Security Directory Integrator V7.2 and IBM Security Directory Server V6.3.1 help unify a universe of identities

IBM United States Software Announcement 213-522
November 12, 2013


Table of contents
Overview Overview Publications Publications
Key prerequisites Key prerequisites Technical information Technical information
Planned availability date Planned availability date Ordering information Ordering information
Description Description Terms and conditions Terms and conditions
Product positioning Product positioning Prices Prices
Program number Program number Order now Order now


Top rule
At a glance
Bottom rule

IBM® Security Directory Integrator V7.2 and IBM Security Directory Server V6.3.1:

For ordering, contact your IBM representative, an IBM Business Partner, or IBM Americas Call Centers at 800-IBM-CALL (Reference: YE001).



Back to topBack to top
 
Top rule
Overview
Bottom rule

IBM Security Directory Integrator V7.2

IBM Security Directory Integrator V7.2 is an open-architecture, integration solution that synchronizes and exchanges information across multiple applications, directories, and databases, providing a single authoritative enterprise-level view of identity or generic data.

IBM Security Directory Integrator is available as two options:

These two options offer the same functionality. The only difference is the licensing model offered.

What is new

IBM Security Directory Integrator V7.2 continues to grow as a key integration framework. There are several new features.

IBM Security Directory Server V6.3.1

IBM Security Directory Server provides a solid directory foundation that can help provide a trusted identity data infrastructure that enables mission-critical security and authentication. IBM Security Directory Server offers a reliable, scalable, standards-based identity data platform that interoperates with a broad range of operating systems and applications. Security Directory Server supports LDAP V3.

What is new

IBM Security Directory Server is a very flexible yet highly scalable LDAP infrastructure. New features:

IBM Security Directory Server is sold based on the Processor Value Unit metric only.



Back to topBack to top
 
Top rule
Key prerequisites
Bottom rule

For details, refer to the Hardware requirements and the Software requirements sections.



Back to topBack to top
 
Top rule
Planned availability date
Bottom rule

December 6, 2013: For electronic availability

December 13, 2013: For media availability



Back to topBack to top
 
Top rule
Description
Bottom rule

IBM Security Directory Integrator V7.2 helps you quickly and effectively integrate data residing in heterogeneous directories, databases, files, collaborative systems, and applications. You are able to create an authoritative data infrastructure that helps accelerate the deployment of critical business on demand applications such as identity management and portal solutions. Using the Representational State Transfer (REST) interface, third-party applications can use Security Directory Integrator as a service.

IBM Security Directory Integrator V7.2 can help you create a powerful and authoritative enterprise directory infrastructure by serving as a flexible, synchronized layer between your company's identity structure and the application sources of identity data.

IBM Security Directory Integrator V7.2 also provides batch and real-time synchronization between multiple generic data sources and targets that consolidate information into a single accurate repository across the enterprise, which can decrease administrative costs. Real-time synchronization between data sources helps provide authoritative up-to-date information for on demand applications, where machine-to-machine transactions require that data must be accurate and reliable.

IBM Security Directory Server V6.3.1 offers a reliable, scalable, standards-based identity data platform that interoperates with a broad range of operating systems and applications. Security Directory Server supports the Lightweight Directory Access Protocol (LDAP) V3. A solid directory foundation can provide a trusted identity data infrastructure that enables mission-critical security and authentication.

The strong scalability and flexibility offered by Security Directory Server can benefit third-party applications as well as with other IBM products, such as IBM Security Identity Manager, IBM Security Access Manager, the IBM WebSphere® Application Portal family of products and the IBM AIX operating system, for which Security Directory Server is the default directory.

Security Directory Server offers robust replication features, including the ability to configure multiple master copies to provide highly available implementations for global enterprise 24 x 7 support for important business applications.

Accessibility by people with disabilities

A US Section 508 Voluntary Product Accessibility Template (VPAT) containing details on accessibility compliance can be requested at

http://www.ibm.com/able/product_accessibility/index.html

Section 508 of the US Rehabilitation Act

Security Directory Integrator and Security Directory Server are capable as of December 6, 2013, when used in accordance with IBM's associated documentation, of satisfying the applicable requirements of Section 508 of the Rehabilitation Act, provided that any assistive technology used with the product properly interoperates with it. A US Section 508 Voluntary Product Accessibility Template (VPAT) can be requested on the following website

http://www.ibm.com/able/product_accessibility/index.html


Back to topBack to top
 
Top rule
Product positioning
Bottom rule

Security Directory Integrator provides real-time synchronization between data sources, so that an enterprise can count on authoritative, up-to-date information for their on demand applications, where machine-to-machine transactions require that data must be accurate and reliable.

Security Directory Integrator Identity Edition can help you create a authoritative enterprise directory infrastructure by serving as a flexible, synchronized layer between a company's identity structure and the application sources of identity data.

Security Directory Integrator General Purpose Edition provides batch and real-time synchronization between multiple generic data sources and targets, to consolidate information into a single accurate repository across the enterprise, which can decrease administrative costs.

Autonomic computing

Autonomic computing is the ability to implement trusted systems; it can position you for future software architectures, such as web services, that can expose your internal processes to your supply chain, your significant customers, and to the growing mass of automated machine-to-machine transactions. Managing identity authentication services on an application-by-application basis can be a significant risk exposure in this integrated architecture. To this end, e-business applications are increasingly "directory-enabled;" that is, they require an open, authoritative source for identity data to enable it to be securely managed as a strategic enterprise resource separately from applications.

Security Directory Server creates a highly reliable, scalable, and authoritative identity data infrastructure necessary to enable autonomic computing.

IBM software support

Security Directory Server is the default directory for IBM WebSphere Application Server, IBM WebSphere Portal, IBM Security Identity Manager, and IBM Security Access Manager, as well as the AIX operating system. With its open-architecture approach, Security Directory Server can fit well into an existing environment and offers the flexibility to add new directory-enabled IBM or non-IBM applications in the future.

Security Directory Server provides the identity data foundation for IBM security integrated identity management and plays a key role in building the enterprise identity data infrastructure for security identity management services.

With IBM DB2 technology as its backend store, Security Directory Server has exceptional reliability and scalability.

Security Directory Server supports a broad range of operating systems including AIX, Solaris, Microsoft Windows, and Linux for Intel as well as all IBM System i, System p, System x, System z, and POWERLinux systems. By replacing OpenLDAP with a directory infrastructure of enterprise-class scalability and reliability, Security Directory Server becomes a key enabler of Linux as an enterprise software platform.

Security Directory Server is complementary to IBM platform-optimized directories. It can replicate directly with the IBM i5/OS and IBM z/OS LDAP directories and can synchronize with the IBM Lotus Domino Directory via the IBM Security Directory Integrator, creating a comprehensive IBM strategic directory architecture that encompasses all IBM platforms.

Security Directory Server has an important complementary relationship with Security Directory Integrator, which synchronizes directory data to the authoritative source across the enterprise. Security Directory Server is the default persistent data store for IBM Security Directory Integrator when that capability is required. A limited use version of Security Directory Integrator is available with Security Directory Server via Passport Advantage.

For Security Directory Server implementations, IBM offers a highly skilled global services organization experienced in addressing directory integration challenges and helping customers with their implementation at any phase of deployment.



Back to topBack to top
 
Top rule
Program number
Bottom rule

 
Program                Program
number         VRM     name
 
5724-K74       7.2.0   IBM Security Directory Integrator
5724-J39       6.3.1   IBM Security Directory Server


Back to topBack to top
 
Top rule
Education support
Bottom rule

IBM training provides education to support many IBM offerings. Descriptions of courses for IT professionals and managers are on the IBM training website

http://www.ibm.com/services/learning/

Call IBM training at 800-IBM-TEACH (426-8322) for catalogs, schedules, and enrollments.



Back to topBack to top
 
Top rule
Offering Information
Bottom rule

Product information is available via the Offering Information website

http://www.ibm.com/common/ssi

Also, visit the Passport Advantage® website

http://www.ibm.com/software/passportadvantage


Back to topBack to top
 
Top rule
Publications
Bottom rule

The IBM Security Directory Integrator V7.2 Quick Start Guide, English and translated publication, is delivered hardcopy and on a separate publications CD-ROM with the basic machine-readable material.

The following English publications and national language publications will be available at electronic availability and can also be downloaded from the following website

http://publib.boulder.ibm.com/infocenter/tivihelp/v2r1/index.jsp
 
Title                                             Order number

IBM Security Directory Integrator V7.2:
Federated Directory Server Administration Guide   SC27-6211-00
Getting Started                                   GI11-9325-02
Quick Start Guide                                 GI11-9327-02
Release Notes                                     GI11-9326-02
Reference Guide                                   SC27-2707-02
Installation and Administrator Guide              SC27-2705-02
Users Guide                                       SC27-2706-02
Problem Determination Guide                       GC27-2709-02
Message Guide                                     GC27-2710-02
Password Synchronization Plug-ins Guide           SC27-2708-02

The IBM Security Directory Server V6.3.1 Quick Start Guide (English) is shipped on the product DVD.

IBM Security Directory Server V6.3.1 English publications may be downloaded, at electronic availability, from

http://publib.boulder.ibm.com/infocenter/tivihelp/v2r1/index.jsp
Title                                             Order number

IBM Security Directory Server V6.3.1:
Product Overview                                  GC27-6212-00
  (This new publication combines what is new
  in this release and the System Requirements
  guides.)
Quick Start Guide                                 GI11-9351-01
Installation and Configuration Guide              SC27-2747-01
Command Reference                                 SC27-2753-01
Administration Guide                              SC27-2749-01
Performance Tuning and Capacity Planning Guide    SC27-2748-01
Programming Reference                             SC27-2754-01
Server Plug-ins Reference                         SC27-2750-01
Error Message Reference                           GC27-2751-01
Troubleshooting Guide                             GC27-2752-01

The IBM Publications Center

http://www.ibm.com/shop/publications/order

The Publications Center is a worldwide central repository for IBM product publications and marketing material with a catalog of 70,000 items. Extensive search facilities are provided. Payment options for orders are via credit card (in the US) or customer number for 20 countries. A large number of publications are available online in various file formats, and they can all be downloaded by all countries, free of charge.



Back to topBack to top
 
Top rule
Technical information
Bottom rule

Specified operating environment

Hardware requirements

IBM Security Directory Integrator V7.2

1 GHz machine, with a minimum of 512 MB memory, is required for each platform.

IBM Security Directory Server V6.3.1

The following sections show system requirements for the IBM Security Directory Server V6.3.1 client and server on all supported operating systems.

For clients: A minimum of 128 MB RAM is required. For better results, use 256 MB or more.

For servers

Note: These recommendations are based on a directory with 100,000 inetOrgPerson LDAP objects, where each entry is approximately 10 KB. Requirements will vary based on your directory and performance responsiveness requirements.

The following amounts of RAM are recommended for each directory server instance:

Add these memory requirements together if you have the directory server, Web Administration Tool, Security Directory Integrator solutions, and the embedded version of WebSphere Application Server running on the same computer.

IBM Security Directory Server (including all the components) requires about 2 GB of disk space. This might increase based on the number of entries and the size of each entry for your installation.

Software requirements

IBM Security Directory Integrator V7.2 detailed system requirements, by operating system, can be found at the following links at electronic availability.

AIX

http://pic.dhe.ibm.com/infocenter/prodguid/v1r0/clarity-reports/report/html/softwareReq sForProduct?deliverableId=1356280183998&osPlatform=AIX

Linux

http://pic.dhe.ibm.com/infocenter/prodguid/v1r0/clarity-reports/report/html/softwareReq sForProduct?deliverableId=1356280183998&osPlatform=Linux

Solaris

http://pic.dhe.ibm.com/infocenter/prodguid/v1r0/clarity-reports/report/html/softwareReq sForProduct?deliverableId=1356280183998&osPlatform=Solaris

Microsoft Windows

http://pic.dhe.ibm.com/infocenter/prodguid/v1r0/clarity-reports/report/html/softwareReq sForProduct?deliverableId=1356280183998&osPlatform=Windows

The detailed system requirements contain a variety of information on each operating system. However, a custom search can be done by accessing

http://pic.dhe.ibm.com/infocenter/prodguid/v1r0/clarity/index.html

IBM Security Directory Server V6.3.1 detailed system requirements, by operating system, can be found at the following links at electronic availability.

AIX

http://pic.dhe.ibm.com/infocenter/prodguid/v1r0/clarity-reports/report/html/softwareReq sForProduct?deliverableId=1295861961251&osPlatform=AIX

HP

http://pic.dhe.ibm.com/infocenter/prodguid/v1r0/clarity-reports/report/html/softwareReq sForProduct?deliverableId=1295861961251&osPlatform=HP

Linux

http://pic.dhe.ibm.com/infocenter/prodguid/v1r0/clarity-reports/report/html/softwareReq sForProduct?deliverableId=1295861961251&osPlatform=Linux

Solaris

http://pic.dhe.ibm.com/infocenter/prodguid/v1r0/clarity-reports/report/html/softwareReq sForProduct?deliverableId=1295861961251&osPlatform=Solaris

Microsoft Windows

http://pic.dhe.ibm.com/infocenter/prodguid/v1r0/clarity-reports/report/html/softwareReq sForProduct?deliverableId=1295861961251&osPlatform=Windows

The detailed system requirements contain a variety of information on each operating system. However, a custom search can be done by accessing

http://pic.dhe.ibm.com/infocenter/prodguid/v1r0/clarity/index.html

The program's specifications and specified operating environment information may be found in documentation accompanying the program, if available, such as a readme file, or other information published by IBM , such as an announcement letter. Documentation and other program content may be supplied only in the English language.

IBM Electronic Support

The IBM Support Portal is your gateway to technical support. This includes IBM Electronic Support tools and resources, for software and hardware, to help save time and simplify support. The Electronic Support tools can help you find answers to questions, download fixes, troubleshoot, automate data collection, submit and track problems through the Service Request online tool, and build skills. All these tools are made available through your IBM support agreement, at no additional charge.

Read about the Electronic Support portfolio of tools

http://ibm.com/electronicsupport

Access the IBM Support Portal

http://ibm.com/support

Access the online Service Request tool

http://ibm.com/support/servicerequest

Planning information

Software Subscription and Support (also referred to as Software Maintenance) is included with licenses purchased through Passport Advantage and Passport Advantage Express® . Product upgrades and technical support are provided by the Software Subscription and Support (Software Maintenance) offering as described in the Agreements. Product upgrades provide the latest versions and releases to entitled software, and technical support provides voice and electronic access to IBM support organizations, worldwide.

IBM includes one year of Software Subscription and Support (also referred to as Software Maintenance) with each program license acquired. The initial period of Software Subscription and Support (Software Maintenance) can be extended by the purchase of a renewal option, if available.

Packaging

IBM Security Directory Integrator and IBM PRODSDS. distributed with:

This program, when downloaded from a website, contains the applicable IBM license agreement and License Information, if appropriate, and will be presented for acceptance at the time of installation of the program. For future reference, the license and License Information will be stored in a directory such as LICENSE.TXT.

Security, auditability, and control

IBM Security Directory Integrator and IBM Security Directory Server use the security and auditability features of the operating system software. The customer is responsible for evaluation, selection, and implementation of security features, administrative procedures, and appropriate controls in application systems and communication facilities.



Back to topBack to top
 
Top rule
Software Services
Bottom rule

IBM Software Services has the breadth, depth, and reach to manage your services needs. You can leverage the deep technical skills of our lab-based, software services team and the business consulting, project management, and infrastructure expertise of our IBM Global Services team. Also, we extend our IBM Software Services reach through IBM Business Partners to provide an extensive portfolio of capabilities. Together, we provide the global reach, intellectual capital, industry insight, and technology leadership to support a wide range of critical business needs.

To learn more about IBM Software Services or to contact a Software Services sales specialist, visit

http://www.ibm.com/software/sw-services/


Back to topBack to top
 
Top rule
Ordering information
Bottom rule

This product is only available via Passport Advantage . It is not available as shrinkwrap.

These products may only be sold directly by IBM or by authorized IBM Business Partners for Software Value Plus.

For more information about IBM Software Value Plus, visit

http://www.ibm.com/partnerworld/page/svp_authorized_portfolio

To locate IBM Business Partners for Software Value Plus in your geography for a specific Software Value Plus portfolio, visit

http://www.ibm.com/partnerworld/wps/bplocator/
 
Product group: IBM Security Systems
  Product Identifier Description           (PID)
  IBM Security Directory Integrator V7.2   5724-K74
  IBM Security Directory Server V6.3.1     5724-J39
 
Product category: Security Directory Integrator and
                  Security Directory Server

Passport Advantage

The following part numbers have not changed. Only the program name has changed from Tivoli® to Security.

                                                             Part
Program name/Description                                     number

IBM Directory Integrator (5724-K74)
 
IBM Security Directory Integrator Identity Edition           D54Q4LL
User Value Unit License + SW Subscription & Support
12 Mos
 
IBM Security Directory Integrator Identity Edition           E01MZLL
User Value Unit SW Subscription & Support Renewal
 
IBM Security Directory Integrator Identity Edition           D54Q5LL
User Value Unit SW Subscription & Support Reinstatement
 
IBM Security Directory Integrator General Purpose Edition    D03PZLL
PVU License + SW Subscription & Support 12 Mos
 
IBM Security Directory Integrator General Purpose Edition    E04M7LL
PVU Annual SW Subscription & Support Renewal
 
IBM Security Directory Integrator General Purpose Edition    D03Q0LL
PVU Subscription & Support Reinstatement
 
IBM Security Directory Integrator General Purpose Edition    D091GLL
Non Production PVU License + SW
Subscription & Support 12 Mos
 
IBM Security Directory Integrator General Purpose Edition    E06VRLL
Non Production PVU Annual SW Subscription & Support
Renewal
 
IBM Security Directory Integrator General Purpose Edition    D091HLL
Non Production PVU SW Subscription & Support
Reinstatement
 
IBM Directory Server (5724-J39)
 
IBM Security Directory Server Processor Value Unit (PVU)     E029WLL
Annual SW Subscription & Support Renewal
 
IBM Security Directory Server Processor Value Unit (PVU)     D56L1LL
License + SW Subscription & Support 12 Months
 
IBM Security Directory Server Processor Value Unit (PVU)     D56L2LL
SW Subscription & Support Reinstatement 12 Months
 

Passport Advantage customer: Media pack entitlement details

Customers with active maintenance or subscription for the products listed are entitled to receive the corresponding media pack.

 
Media packs
description                                      Part number

Security Directory Integrator 7.2  DVD MP, ML,   BJ14TML
Media Pac

Cross-platform product for use on System z® Integrated Facility for Linux (IFL) engines or zEnterprise® BladeCenter® Extension

Order the part numbers that follow when the product is intended to run on zEnterprise BladeCenter Extension or the Linux operating system on System z IFL engines. If the product is not intended to run in these environments, order from the other set of part numbers in this announcement. This set of part numbers provides the identical supply and authorization as the other set in this announcement.

The following part numbers have not changed. Only the program name was changed from Tivoli to Security.

                                                             Part
Program name/Description                                     number

IBM Security Directory Integrator (5724-K74)
 
IBM Security Directory Integrator Identity Edition           D58V7LL
for zEnterprise BladeCenter Extension and
Linux on System z User Value Unit License + SW
Subscription & Support 12 Mos
 
IBM Security Directory Integrator Identity Edition           E02R0LL
for zEnterprise BladeCenter Extension and
Linux on System z User Value Unit SW Subscription &
Support Renewal
 
IBM Security Directory Integrator Identity Edition           D58V8LL
for zEnterprise BladeCenter Extension and
Linux on System z User Value Unit SW Subscription &
Support Reinstatement
 
 
IBM Security Directory Integrator General Purpose Edition    D03PXLL
for zEnterprise BladeCenter Extension and
Linux on System z PVU License + SW Subscription
& Support 12 Mos
 
IBM Security Directory Integrator General Purpose Edition    E04M6LL
for zEnterprise BladeCenter Extension and
Linux on System z PVU SW Subscription &
Support Renewal
 
IBM Security Directory Integrator General Purpose Edition    D03PYLL
for zEnterprise BladeCenter Extension and
Linux on System z PVU SW Subscription & Support
Reinstatement
 
IBM Security Directory Integrator General Purpose Edition    D091ILL
Non Production for zEnterprise BladeCenter Extension
and Linux on System z PVU License +
SW Subscription & Support 12 Mos
 
IBM Security Directory Integrator General Purpose Edition    E06VSLL
Non Production for zEnterprise BladeCenter Extension
and Linux on System z PVU SW Subscription
& Support Renewal
 
IBM Security Directory Integrator General Purpose Edition    D091JLL
Non Production for zEnterprise BladeCenter Extension
and Linux on System z PVU SW Subscription & Support
Reinstatement
 
IBM Directory Server (5724-J39)
 
IBM Security Directory Server for Linux on z Processor       E029XLL
Value Unit (PVU) Annual SW Subscription & Support
Renewal
 
IBM Security Directory Server for Linux on z Processor       D56L3LL
Value Unit (PVU) License + SW Subscription & Support
12 Months
 
IBM Security Directory Server for Linux on z Processor       D56L4LL
Value Unit (PVU) SW Subscription & Support
Reinstatement 12 Months

Charge metric

 
                                        PID
Program name                            number        Charge metric

IBM Security Directory Integrator V7.2  5724-K74      User Value Unit
Identity Edition
IBM Security Directory Integrator V7.2  5724-K74      Processor Value
General Purpose Edition                                 Unit
IBM Security Directory Server V6.3.1    5724-J39      Processor Value
                                                        Unit

The following examples are provided to illustrate licensing requirements and should be used to determine required license entitlements for the following distributed products.

IBM Security Directory Integrator pricing examples

Pricing example for IBM Security Directory Integrator Identity Edition V7.2 - per Authorized User Value Unit

The examples provided for Security Directory Integrator Identity Edition show how authorized users are counted in calculating Value Units. An external user is one that is not part of the enterprise. Security Directory Integrator uses a ratio of 15 external authorized users equal 1 chargeable user for the purpose of calculating Value Units. Each internal user equals one chargeable user for the purpose of calculating User Value Units. Internal and external authorized users are combined to calculate total chargeable users required. Infrequent internal users who utilize their IDs less than 5 times a year, and are grouped so as to be trackable and auditable, will be granted a ratio of 15 infrequent internal users equal to 1 chargeable user for the purpose of calculating User Value Units.

Chargeable users are added up and the volume tiering table is then utilized to calculate the total User Value Units required to cover entitlements.

User Value Units are calculated based on a scalable usage model following the eight tier chargeable user structure mentioned below:

 
Scalable
usage level     1           2            3            4
 
Chargeable    Up to 5K    >5K-10K     >10K-35K     >50K - 150K
users        
 
Value Units   1,000       500         300          200
per 1,000
authorized
users
 
Scalable
usage level     5           6            7             8
 
Chargeable    >150K-500K  >500K-1M     1M-3M          >3M
users          
Value Units   100         50           25             10
per 1,000
authorized
users

Scenario 1

Transaction 1: The client is using Security Directory Integrator Identity Edition for an environment comprised of 3 connected systems with a total of 12,000 unique internal users.

The client would purchase 8,500 User Value Units of Security Directory Integrator Identity Edition. Refer to the calculation below based on the scalable usage model referenced above.

Pricing     Users required    User Value Units  User Value
metric      in the client     per 1,000 users   Units required
            environment (A)   (B)               (A*B)/1,000
 
Tier 1       5,000            1,000             5,000
Tier 2       7,000              500             3,500
Tier 3                          300
Tier 4                          200
 
Total users 12,000                              8,500

Scenario 2

Transaction 1: A large enterprise is using Security Directory Integrator Identity Edition for an environment comprised of 3 connected systems with 9,000 unique internal corporate users and 45,000 infrequent factory employees (usage less than 5 times per year).

The chargeable authorized users are counted as follows:

This equates to 12,000 chargeable users for the purpose of calculating User Value Units.

All users are counted one time regardless of the number of connections.

Based on 12,000 chargeable users, the total number of User Value Units required is 8,500, the same as described in scenario 1.

Transaction 2: The large enterprise, 6 months after Transaction 1, now requires Security Directory Integrator Identity Edition for its environment, which has grown to 6 connections and now includes 1,500,000 external users in addition to the existing 12,000 internal chargeable users.

For external users, we use the ratio 1 internal user equals 15 external users to calculate the UVUs. The total users are calculated as follows:

Calculate User Value Units

The client would purchase 32,900 User Value Units of IBM Security Directory Integrator Identity Edition. Refer to the calculation below based on the scalable usage model referenced above.

 
Pricing metric  Users required   User Value Units User Value
                in client        per 1,000 users  Units required
                environment (A)  (B)              (A*B)/1000
 
Tier 1           5,000           1,000             5,000
Tier 2          10,000             500             5,000
Tier 3          35,000             300            10,500
Tier 4          62,000             200            12,400
 
Total users    112,000                            32,900

Scenario 3

Transaction 1: A client wants to create a single authoritative data source of its employees using the Federated Directory Server feature of Security Directory Integrator V7.2. The single authoritative data source would be used for the following:

At present, the data is distributed across enterprise:

So the total unique users are 3,000 + 2,000 + 1,200 - 200 + 6,000 = 12,000. Since all the users are internal, the client would purchase 8,500 User Value Units of Security Directory Integrator Identity Edition as described in scenario 1.

By paying the 8,500 UVU price, the client is entitled to deploy IBM Security Directory Server to create the single centralized authoritative data repository as long as the number of users are limited to the same 12,000 unique users. There is no restriction which application, whether IBM or non-IBM, uses this centralized repository. They are also entitled to use proxy features and WhitePages application of IBM Security Directory Server as long it is being used for the same unique users. If they wish they can use the third-party WhitePages application on the top of this centralized repository created in IBM Security Directory Server given the fact it is for the same unique users. The client is free to create their failover setup and there is no restriction in terms of number of instances of IBM Security Directory Integrator and IBM Security Directory Server as long as it is used for the same unique users.

The similar scenario can be extended for external users also. The only difference is that 15 external users are considered equivalent to 1 chargeable user demonstrated in scenario 2.

Pricing example for IBM Security Directory Integrator General Purpose Edition V7.2 - per Processor Value Unit (PVU)

In pricing Security Directory Integrator General Purpose Edition, the examples provided show how processors are counted in calculating Value Units.

Scenario 4

Transaction 1: Company A wants to entitle usage of Security Directory integrator General Purpose Edition with Change and Configuration Management Database (CCMDB) and use Security Directory Integrator General Purpose Edition to pull systems information from their custom applications into CCMDB. In addition, they want to use Security Directory Integrator General Purpose Edition to directly integrate other custom data with IBM Maximo® on two other servers, which is outside the scope of the CCMDB license. (Security Directory Integrator is only bundled for CCMDB integration.) The desired data spans three geographic locations, driving the requirements for three separate installations. In location A1, Company A plans to install Security Directory Integrator General Purpose Edition on a server having two core processors, while in locations A2 and A3, servers having one processor core are utilized. To support their configuration, the customer must purchase PVUs for 2 processor cores at site A1, 1 processor at site A2, and 1 processor at site A3, which equals 4 total processor cores on 3 servers.

To create the failover setup or get additional licenses for development and test, the following rules will apply:

Scenario 5

Transaction 1: Company B wants to deploy Alphablox but needs to bring enterprise data from a number of Microsoft Excel spreadsheets into the Alphablox environment. They want to use Security Directory Integrator General Purpose Edition for this purpose because they recognize that, even though initial data is in Excel format, later expansion of the Alphablox usage may be able to leverage the wide range of data sources from which Security Directory Integrator General Purpose Edition can extract data. For this entitlement, Security Directory Integrator General Purpose Edition is installed on one dual-processor computer, requiring Company B to purchase PVUs required to entitle both processors cores on the server.

Transaction 2: In addition, Company B has 15 trading partners that need to similarly extract data from their own systems and provide such data to Company B on a regular basis. As the initiator of this initiative, Company B has requested that its trading partners use Security Directory Integrator General Purpose Edition to move their data. Company B plans to install Security Directory Integrator General Purpose Edition on a quad-CPU server, and, therefore, must purchase PVUs required to entitle 4 processors. In addition, most of the trading partners have chosen to participate in setting up their environments in support of this initiative. Each of these trading partners has installed Security Directory Integrator General Purpose Edition on a single-CPU server. Each customer is required to purchase PVUs required for their single processor.

Note: For Scenarios 4 and 5, not all processors require the same number of PVU entitlements per processor core. To determine the number of Value Unit entitlements required, refer to the PVU conversion table on the Passport Advantage website.

Licensees of earlier releases of Security Directory Integrator, current on Software Maintenance, are entitled to receive Security Directory Integrator V7.2.

IBM Security Directory Server pricing example

The following customer network (referred to as the core environment) applies to all of the examples to enable the reader to see where products tend to manage something less than the entire environment. The customer's overall core environment includes:

Distributed servers

The customer wants to manage the applicable distributed server environment, which requires Value Unit entitlements associated with the following number of processors:

                                          Quantity in
                                          customer       Processors* to
Systems managed                           environment    be licensed

Uniprocessor                              20              20
2-way                                     65             130
4-way                                     12              48
8-way                                      1               8
12-way (2 logical partitions)              1               4
14-way                                     1              14
16-way (2 physical partitions,             1               8
 one of which is managed by IBM
 Security applications)
24-way                                     1              24
z9 server with 2 IFLs                      1               2
  (requires Linux on System z
  availability)

Total processors to be licensed                          258

* Processors refer to Processor Cores.

Charge metric definitions

User Value Unit (UVU)

UVU is a unit of measure by which the program can be licensed. UVU Proofs of Entitlement (PoEs) are based on the number and type of users for the given program. Licensee must obtain sufficient entitlements for the number of UVUs required for licensee's environment as specified in the program specific table. The UVU entitlements are specific to the program and type of user and may not be exchanged, interchanged, or aggregated with UVU entitlements of another program or type of user. Refer to the program specific UVU table.

Processor Value Unit (PVU)

PVU is a unit of measure by which the program can be licensed. The number of PVU entitlements required is based on the processor technology (defined within the PVU table by processor value, brand, type, and model number at the website below) and the number of processors made available to the program. IBM continues to define a processor, for the purpose of PVU-based licensing, to be each processor core on a chip. A dual-core processor chip, for example, has two processor cores. The PVU table can be found at

http://www.ibm.com/software/lotus/passportadvantage/pvu_licensing_for_customers.html

Licensee can deploy the program using either full capacity licensing or virtualization capacity (sub-capacity) licensing according to the Passport Advantage Sub-Capacity Licensing Terms (refer to the web page below). If using full capacity licensing, licensee must obtain PVU entitlements sufficient to cover all activated processor cores* in the physical hardware environment made available to or managed by the program, except for those servers from which the program has been permanently removed. If using virtualization capacity licensing, licensee must obtain entitlements sufficient to cover all activated processor cores made available to or managed by the program, as defined according to the Virtualization Capacity License Counting Rules at

http://www.ibm.com/software/lotus/passportadvantage/Counting_Software_licenses_using_sp ecific_virtualization_technologies.html

* An activated processor core is a processor core that is available for use in a physical or virtual server, regardless of whether the capacity of the processor core can be or is limited through virtualization technologies, operating system commands, BIOS settings, or similar restrictions.

Notes :



Back to topBack to top
 
Top rule
Terms and conditions
Bottom rule

The information provided in this announcement letter is for reference and convenience purposes only. The terms and conditions that govern any transaction with IBM are contained in the applicable contract documents such as the IBM International Program License Agreement, IBM International Passport Advantage Agreement, and the IBM Agreement for Acquisition of Software Maintenance.

This product is only available via Passport Advantage . It is not available as shrinkwrap.

Licensing

IBM International Program License Agreement including the License Information document and PoE govern your use of the program. PoEs are required for all authorized use. Part number products only, offered outside of Passport Advantage , where applicable, are license only and do not include Software Maintenance.

This software license includes Software Subscription and Support (also referred to as Software Maintenance).

These programs are licensed under the IBM Program License Agreement (IPLA) and the associated Agreement for Acquisition of Software Maintenance, which provide for support with ongoing access to releases and versions of the program. IBM includes one year of Software Subscription and Support (also referred to as Software Maintenance) with the initial license acquisition of each program acquired. The initial period of Software Subscription and Support (also referred to as Software Maintenance) can be extended by the purchase of a renewal option, if available. These programs have a one-time license charge for use of the program and an annual renewable charge for the enhanced support that includes telephone assistance (voice support for defects during normal business hours), as well as access to updates, releases, and versions of the program as long as support is in effect.

License Information form number

The program's License Information will be available for review on the IBM Software License Agreement website

http://www.ibm.com/software/sla/sladb.nsf
Limited warranty applies

Yes

Limited warranty

IBM warrants that when the program is used in the specified operating environment, it will conform to its specifications. The warranty applies only to the unmodified portion of the program. IBM does not warrant uninterrupted or error-free operation of the program or that IBM will correct all program defects. You are responsible for the results obtained from the use of the program.

IBM provides you with access to IBM databases containing information on known program defects, defect corrections, restrictions, and bypasses at no additional charge. For further information, consult the IBM Software Support Handbook found at

http://www.ibm.com/support/handbook

IBM will maintain this information for at least one year after the original licensee acquires the program (warranty period).

Program technical support

This technical support allows you to obtain assistance (via telephone or electronic means) from IBM for product-specific, task-oriented questions regarding the installation and operation of the program product. Software/Appliance Subscription and Support (Software/Appliance Maintenance) also provides you with access to updates (modifications or fixes), releases, and versions of the program. You will be notified, via announcement letter, of discontinuance of support with 12 months' notice. If you require additional technical support from IBM , including an extension of support beyond the discontinuance date, contact your IBM representative or IBM Business Partner. This extension may be available for a fee.

Money-back guarantee

If for any reason you are dissatisfied with the program and you are the original licensee, you may obtain a refund of the amount you paid for it, if within 30 days of your invoice date you return the program and its PoE to the party from whom you obtained it. If you downloaded the program, you may contact the party from whom you acquired it for instructions on how to obtain the refund.

For clarification, note that (1) for programs acquired under the IBM International Passport Advantage offering, this term applies only to your first acquisition of the program and (2) for programs acquired under any of IBM's On/Off Capacity on Demand (On/Off CoD) software offerings, this term does not apply since these offerings apply to programs already acquired and in use by you.

Other terms
Volume orders (IVO)

No

IBM International Passport Advantage Agreement
Passport Advantage applies

Yes, and through the Passport Advantage website at

http://www.ibm.com/software/passportadvantage
Usage restriction

Yes. Refer to the IBM Security Directory Integrator V7.2 and IBM Security Directory Server V6.3.1 license agreements for usage restrictions for Supporting Programs and their components licensed with these products. Access

http://www.ibm.com/software/sla/sladb.nsf
Software Subscription and Support applies

Yes. Software Subscription and Support (also referred to as Software Maintenance) is included with licenses purchased through Passport Advantage and Passport Advantage Express . Product upgrades and Technical Support are provided by the Software Subscription and Support offering as described in the Agreements. Product upgrades provide the latest versions and releases to entitled software and Technical Support provides voice and electronic access to IBM support organizations, worldwide.

IBM includes one year of Software Subscription and Support with each program license acquired. The initial period of Software Subscription and Support can be extended by the purchase of a renewal option, if available.

While your Software Subscription and Support is in effect, IBM provides you assistance for your routine, short duration installation and usage (how-to) questions, and code-related questions. IBM provides assistance via telephone and, if available, electronic access, only to your information systems (IS) technical support personnel during the normal business hours (published prime shift hours) of your IBM support center. (This assistance is not available to your end users.) IBM provides Severity 1 assistance 24 hours a day, 7 days a week. For additional details, consult your IBM Software Support Handbook at

http://www.ibm.com/support/handbook

Software Subscription and Support does not include assistance for the design and development of applications, your use of programs in other than their specified operating environment, or failures caused by products for which IBM is not responsible under the applicable agreements.

For additional information about the International Passport Advantage Agreement and the IBM International Passport Advantage Express Agreement, visit the Passport Advantage website at

http://www.ibm.com/software/passportadvantage
System i® Software Maintenance applies

No

Variable charges apply

No

Educational allowance available

Not applicable.



Back to topBack to top
 
Top rule
Statement of good security practices
Bottom rule

IT system security involves protecting systems and information through prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered destroyed or misappropriated or can result in misuse of your systems to attack others. Without a comprehensive approach to security, no IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party.



Back to topBack to top
 
Top rule
IBM Electronic Services
Bottom rule

Electronic Service Agent™ and the IBM Electronic Support web portal are dedicated to providing fast, exceptional support to IBM Systems customers. The IBM Electronic Service Agent tool is a no-additional-charge tool that proactively monitors and reports hardware events, such as system errors, performance issues, and inventory. The Electronic Service Agent tool can help you stay focused on your company's strategic business initiatives, save time, and spend less effort managing day-to-day IT maintenance issues. Servers enabled with this tool can be monitored remotely around the clock by IBM Support all at no additional cost to you.

Now integrated into the base operating system of AIX V5.3, AIX V6.1, and AIX V7.1, Electronic Service Agent is designed to automatically and electronically report system failures and utilization issues to IBM , which can result in faster problem resolution and increased availability. System configuration and inventory information collected by the Electronic Service Agent tool also can be viewed on the secure Electronic Support web portal, and used to improve problem determination and resolution by you and the IBM support team. To access the tool main menu, simply type smitty esa_main, and select Configure Electronic Service Agent . In addition, ESA now includes a powerful Web user interface, giving the administrator easy access to status, tool settings, problem information, and filters. For more information and documentation on how to configure and use Electronic Service Agent , refer to

http://www.ibm.com/support/electronic

The IBM Electronic Support portal is a single Internet entry point that replaces the multiple entry points traditionally used to access IBM Internet services and support. This portal enables you to gain easier access to IBM resources for assistance in resolving technical problems. The My Systems and Premium Search functions make it even easier for Electronic Service Agent tool-enabled customers to track system inventory and find pertinent fixes.

Benefits

Increased uptime: The Electronic Service Agent tool is designed to enhance the Warranty or Maintenance Agreement by providing faster hardware error reporting and uploading system information to IBM Support. This can translate to less wasted time monitoring the symptoms, diagnosing the error, and manually calling IBM Support to open a problem record. Its 24 x 7 monitoring and reporting mean no more dependence on human intervention or off-hours customer personnel when errors are encountered in the middle of the night.

Security: The Electronic Service Agent tool is designed to be secure in monitoring, reporting, and storing the data at IBM . The Electronic Service Agent tool securely transmits either via the Internet (HTTPS or VPN) or modem, and can be configured to communicate securely through gateways to provide customers a single point of exit from their site. Communication is one way. Activating Electronic Service Agent does not enable IBM to call into a customer's system. System inventory information is stored in a secure database, which is protected behind IBM firewalls. It is viewable only by the customer and IBM . The customer's business applications or business data is never transmitted to IBM .

More accurate reporting: Since system information and error logs are automatically uploaded to the IBM Support center in conjunction with the service request, customers are not required to find and send system information, decreasing the risk of misreported or misdiagnosed errors. Once inside IBM , problem error data is run through a data knowledge management system and knowledge articles are appended to the problem record.

Customized support: Using the IBM ID entered during activation, customers can view system and support information in the My Systems and Premium Search sections of the Electronic Support website at

http://www.ibm.com/support/electronic

My Systems provides valuable reports of installed hardware and software using information collected from the systems by Electronic Service Agent . Reports are available for any system associated with the customer's IBM ID. Premium Search combines the function of search and the value of Electronic Service Agent information, providing advanced search of the technical support knowledgebase. Using Premium Search and the Electronic Service Agent information that has been collected from your system, customers are able to see search results that apply specifically to their systems.

For more information on how to utilize the power of IBM Electronic Services, contact your IBM Systems Services Representative, or visit

http://www.ibm.com/support/electronic


Back to topBack to top
 
Top rule
Prices
Bottom rule

Business Partner information

If you are an IBM Business Partner -- Distributor for Workstation Software acquiring products from IBM , you may link to Passport Advantage Online for resellers where you can obtain Business Partner pricing information. An IBM ID and password are required.

https://www.ibm.com/software/howtobuy/passportadvantage/paoreseller

Passport Advantage

For Passport Advantage information and charges, contact your IBM representative or authorized IBM Business Partner for Software Value Plus. Additional information is also available at

http://www.ibm.com/software/passportadvantage

IBM Global Financing

IBM Global Financing offers competitive financing to credit-qualified customers to assist them in acquiring IT solutions. Offerings include financing for IT acquisition, including hardware, software, and services, from both IBM and other manufacturers or vendors. Offerings (for all customer segments: small, medium, and large enterprise), rates, terms, and availability can vary by country. Contact your local IBM Global Financing organization or visit

http://www.ibm.com/financing

IBM Global Financing offerings are provided through IBM Credit LLC in the United States, and other IBM subsidiaries and divisions worldwide to qualified commercial and government customers. Rates are based on a customer's credit rating, financing terms, offering type, equipment type, and options, and may vary by country. Other restrictions may apply. Rates and offerings are subject to change, extension, or withdrawal without notice.

Financing from IBM Global Financing helps you preserve cash and credit lines, enables more technology acquisition within current budget limits, permits accelerated implementation of economically attractive new technologies, offers payment and term flexibility, and can help match project costs to projected benefits. Financing is available worldwide for credit-qualified customers.

For more financing information, visit

http://www.ibm.com/financing


Back to topBack to top
 
Top rule
Order now
Bottom rule

To order, contact the Americas Call Centers or your local IBM representative, or your IBM Business Partner.

To identify your local IBM representative or IBM Business Partner, call 800-IBM-4YOU (426-4968).

Phone:      800-IBM-CALL (426-2255)
Fax:        800-2IBM-FAX (242-6329)
For IBM representative: callserv@ca.ibm.com
For IBM Business Partner: pwcs@us.ibm.com
Mail:       IBM Teleweb Customer Support
            ibm.com® Sales Execution Center, Americas North
            3500 Steeles Ave. East, Tower 3/4
            Markham, Ontario
            Canada
            L3R 2Z1

Reference: YE001

The Americas Call Centers, our national direct marketing organization, can add your name to the mailing list for catalogs of IBM products.


Note: Shipments will begin after the planned availability date.

IBM Software Value Plus

These products are available under IBM Software Value Plus, either directly from IBM or through authorized Business Partners who invest in skills and high-value solutions. IBM customers may benefit from the industry-specific or horizontal solutions, skills, and expertise provided by these Business Partners.

Additions to Software Value Plus will be communicated through standard product announcements. For a current list of IBM software available under Software Value Plus, visit

http://www.ibm.com/partnerworld/page/svp_authorized_portfolio_criteria

For questions regarding Software Value Plus, visit

http://www.ibm.com/partnerworld/page/svp_authorized_portfolio_contacts
Trademarks

Electronic Service Agent is a trademark of IBM Corporation in the United States, other countries, or both.

IBM, QRadar, AIX, WebSphere, Passport Advantage, Express, Tivoli, System z, zEnterprise, BladeCenter, DB2, Maximo, z9, System i and ibm.com are registered trademarks of IBM Corporation in the United States, other countries, or both.

Intel is a trademark of Intel Corporation or its subsidiaries in the United States and other countries.

Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.

Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both.

Other company, product, and service names may be trademarks or service marks of others.

Terms of use

IBM products and services which are announced and available in your country can be ordered under the applicable standard agreements, terms, conditions, and prices in effect at the time. IBM reserves the right to modify or withdraw this announcement at any time without notice. This announcement is provided for your information only. Additional terms of use are located at

http://www.ibm.com/legal/us/en/

For the most current information regarding IBM products, consult your IBM representative or reseller, or visit the IBM worldwide contacts page

http://www.ibm.com/planetwide/us/