Tivoli Access Manager integration prerequisites
The following prerequisites must be met to integrate IBM® EMM with IBM Tivoli Access Manager.
*
The Tivoli Access Manager WebSEAL junction must be configured to pass the user name (Short, not Full DN) as the HTTP variable in the URL request to the IBM® EMM application, and the IBM® EMM Web access control header variable property must be set to the name of this user name variable (by default, iv-user).
*
*
The IBM® EMM application URLs defined by a WebSEAL junction and the Java application server hosting the IBM® EMM application must refer to the same path.
*
All users who need to access IBM® EMM applications must belong to a group added to an Access Control List (ACL) with appropriate permissions. A WebSEAL junction that points to an application server where Plataforma de Marketing is deployed must be attached to this ACL.
*
When users log out of an IBM® EMM application, they are not automatically logged out of Tivoli Access Manager. They must close their browser after they log out of an IBM® EMM application to log out of Tivoli Access Manager.
Enabling the IBM® Scheduler
If you plan to use the IBM® Scheduler, you must configure an Access Control List (ACL) policy in Tivoli as follows.
1.
2.
Click ACL > Create ACL, complete the Name and Description fields, and click Apply.
3.
Click ACL > List ACL, and from the Manage ACLs page, click the link for your ACL policy.
4.
From the ACL Properties page, click Create, and create two entries for your ACL, as follows.
*
For the first entry, set the entry type to unauthenticated and grant Trx - Traverse, read, and execute permissions.
*
For the second entry, set the entry type to Any-other and grant Trx - Traverse, read and execute permissions.
5.
Configuring settings for IBM® Contact Optimization
If you plan to schedule IBM® Contact Optimization sessions, you must configure an Access Control List (ACL) policy in Tivoli as follows.
1.
2.
Click ACL > Create ACL, complete the Name and Description fields, and click Apply.
3.
Click ACL > List ACL, and from the Manage ACLs page, click the link for your ACL policy.
4.
From the ACL Properties page, click Create, and create two entries for your ACL, as follows.
*
For the first entry, set the entry type to unauthenticated and grant Trx - Traverse, read, and execute permissions.
*
For the second entry, set the entry type to Any-other and grant Trx - Traverse, read, and execute permissions.
5.
*
*
*