Planning Enterprise Identity Mapping for IBM i

There are multiple technologies and services that Enterprise Identity Mapping (EIM) encompasses on the IBM® i platform. Prior to configuring EIM on your server, you should decide what functionality you want to implement by using EIM and single sign-on capabilities.

Before implementing EIM, you should have decided basic security requirements for your network and have implemented those security measures. EIM provides administrators and users easier identity management throughout the enterprise. When used with network authentication service, EIM provides single sign-on capabilities for your enterprise.

If you plan on using Kerberos to authenticate users as part of a single signon implementation, you should also configure network authentication service.

To learn more about how to plan your systems EIM configuration, review the following information: