Computer Associates ETRPPCE8005BPE Getting Started Guide - Page 20

Legacy Systems Integration, Easily Populated Databases, Multiple Authentication Methods

Page 20 highlights

Advantages of Using eTrust SSO Legacy Systems Integration Most companies want to be able to use or migrate from legacy systems and data until they are ready to decommission the application or data in a controlled way. Using eTrust SSO, you can leave mission-critical legacy systems in place and create a high-security layer around them. This also means that legacy systems can be phased out gradually. eTrust SSO is available for mainframe applications so that users can access legacy mainframe applications from their personal eTrust SSO application list. For information about how you can reuse user information from existing legacy systems, see the Easily Populated Databases section in this chapter. Easily Populated Databases In the past, building a single sign-on database was a time-consuming and resource-intensive process. eTrust SSO provides unique facilities that automatically create a central repository for user IDs and passwords. It also provides the tools to quickly populate those data repositories with existing data you may have from a legacy system. Multiple Authentication Methods When you implement eTrust SSO, you can use one of the authentication methods that come with eTrust SSO, or you can select a third-party authentication method. eTrust SSO has been developed to work with multiple third-party authentication software and hardware systems. eTrust SSO comes ready to use with several external authentication methods, or you can use the API to create your own interface to any other system. Scalable Data Store eTrust SSO has a directory data store (eTrust Directory) specially designed to safely and efficiently handle large numbers of users. When eTrust SSO is deployed in a server farm environment, it can be scaled to accommodate any number of users. 1-16 eTrust SSO Getting Started

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98

Advantages of Using eTrust SSO
1–16
eTrust SSO Getting Started
Legacy Systems Integration
Most companies want to be able to use or migrate from legacy systems and data
until they are ready to decommission the application or data in a controlled way.
Using eTrust SSO, you can leave mission-critical legacy systems in place and
create a high-security layer around them. This also means that legacy systems
can be phased out gradually.
eTrust SSO is available for mainframe applications so that users can access legacy
mainframe applications from their personal eTrust SSO application list.
For information about how you can reuse user information from existing legacy
systems, see the Easily Populated Databases section in this chapter.
Easily Populated Databases
In the past, building a single sign-on database was a time-consuming and
resource-intensive process. eTrust SSO provides unique facilities that
automatically create a central repository for user IDs and passwords. It also
provides the tools to quickly populate those data repositories with existing data
you may have from a legacy system.
Multiple Authentication Methods
When you implement eTrust SSO, you can use one of the authentication methods
that come with eTrust SSO, or you can select a third-party authentication
method.
eTrust SSO has been developed to work with multiple third-party authentication
software and hardware systems. eTrust SSO comes ready to use with several
external authentication methods, or you can use the API to create your own
interface to any other system.
Scalable Data Store
eTrust SSO has a directory data store (eTrust Directory) specially designed to
safely and efficiently handle large numbers of users. When eTrust SSO is
deployed in a server farm environment, it can be scaled to accommodate any
number of users.