Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this

Table Of Contents

The team that wrote this Redpaper
Become a published author
Chapter 1. Introduction
1.1 Purpose of this Redpaper
1.2 IBM WebSphere Portal Server overview
1.3 What is new in WebSphere Portal Version 6
1.4 Administration improvements
1.5 Structure of the Redpaper
Chapter 2. Architecture and planning
2.1 Building the right Portal architecture
2.1.1 Addressing functionality
2.1.2 Addressing integration
2.1.3 Technology choices for connectivity
2.1.4 The System Context Diagram
2.1.5 Addressing non-functional requirements
2.1.6 Frequently asked questions about sizing
2.2 The building blocks of an architecture
2.2.1 Logical Deployment Units
2.2.2 Node characterization at the specification level
2.3 Operational architectures
2.3.1 Adopting a tiered architecture
2.3.2 Addressing scaleability and high availability
2.4 Portal deployment considerations
2.4.1 In-situ maintenance procedures
2.4.2 Two sets of production environments
2.4.3 The dual cluster with two lines of production architecture
2.4.4 Moving a configuration between environments
2.5 Architecting for performance
2.5.1 Scalability
2.5.2 Guidance regarding vertical and horizontal scaling
2.5.3 WebSphere queuing mechanism
2.5.4 Choosing a platform
2.5.5 Separation of WCM from Portal Servers
2.5.6 Separation of Web servers and WebSphere Portal Servers
2.5.7 JVM recommendations
2.5.8 Portlet application JVM considerations
2.5.9 High availability and HTTPSession failover
2.6 Security
2.6.1 WebSphere Portal Server security
2.6.2 Using External Security Managers
2.6.3 Single Sign-On (SSO)
2.6.4 Trust Association with WebSEAL
2.6.5 LTPA token generation with WebSEAL
2.6.6 Other Tivoli Access Manager considerations
2.6.7 LDAP Directory Servers
2.7 Database considerations
2.7.1 WebSphere Portal Server database disclaimer
2.7.2 Database domains
2.7.3 Distinct databases or distinct schemas
2.7.4 Database high availability
2.8 Portal planning recommendations
2.8.1 Recommendations for a successful implementation
Chapter 3. WebSphere Portal installation
3.1 Installation
3.1.1 How do I prepare my system for installation
3.1.2 What is about to happen
3.1.3 Where do I begin
3.1.4 Is it working
3.2 Database transfer
3.2.1 Planning and considerations
3.2.2 How do I prepare for the database transfer
3.2.3 What is about to happen
3.2.4 Is it working
3.3 Enable security
3.3.1 Planning and considerations
3.3.2 How do I prepare for WebSphere Portal Server LDAP security
3.3.3 What is about to happen
3.3.4 Is it working
3.4 Problem determination
3.4.1 Installation problem determination
3.4.2 Database transfer problem determination
3.4.3 LDAP security problem determination
Chapter 4. WebSphere Portal security
4.1 Planning and considerations
4.1.1 The basics
4.1.2 WebSphere Member Manager (WMM)
4.1.3 User registry and member repository
4.1.4 Single sign-on (SSO)
4.1.5 WebSphere Portal login process
4.1.6 Portal Access Control (PAC)
4.2.1 The default security configuration
4.2.2 Reconfigure security
4.2.3 Change user IDs and passwords
4.2.4 Adding application specific attributes to users and groups
4.2.5 Integration with Tivoli Access Manager (TAM)
4.3 Problem determination
4.3.1 General problem determination recommendations
4.3.2 Typical portal traces for different security scenarios
Here we discuss typical portal traces for different security scenarios
4.3.3 Tools for troubleshooting security problems
4.3.4 Anatomy of configuration files
4.3.5 Reading portal runtime logs
4.3.6 Typical security configuration problems
Chapter 5. WebSphere Portal runtime and
5.1 Overview
5.1.1 Portal runtime architecture
5.1.2 Portal foundation and framework
5.1.3 Portal Services
5.2.2 Tuning advice for the IBM Java Virtual Machine
5.2.3 Tuning advice for the SUN Microsystems Java Virtual Machine (JVM)
5.2.4 WebSphere resource pools
5.2.5 Web container
5.2.6 Data source tuning
5.2.7 WebSphere security tuning
5.2.8 WebSphere session management tuning
5.2.9 WebSphere Member Manager tuning
5.2.10 Portal configuration services tuning
5.3 Problem determination
5.3.1 Identify the failing component
5.3.2 JVM problems
5.3.3 Some common problems and workarounds
5.4 Portal administration tools
5.5 Runtime monitoring
5.5.1 What to monitor
5.5.2 Useful resources
IBM Support Assistant (ISA)
How does ISA help
How do I obtain, install, and access ISA
Best practices
Use case examples - Search
Use case examples - Product Information
Use case examples - Tools
Use case examples - Service
IBM support site
How does the support site help
How can I access the support site
IBM online communities
How do online communities help
How can I access the online communities
IBM RSS feeds
How do RSS feeds help
How can I access the IBM RSS feeds
IBM Support Toolbar
How does the IBM Support Toolbar help
How can I obtain the IBM Support Toolbar
IBM Education Assistant
How does the IBM Education Assistant help
How can I access the IBM Education Assistant
IBM Guided Activity Assistant (IGAA)
How does the IBM Guided Activity Assistant help
How can I access the IBM Guided Activity Assistant (IGAA)
Backup strategy
Overview of the backup process
Our approach to backup
Some additional best practices
Fix strategy
Overview of the maintenance strategy
Our approach to maintenance
Overview of the fix strategy
Our approach to fixes
Migration strategy
What is about to happen: a simple overview of the migration process
Where do you start: planning and considerations
Is it working: verify the migration
When a problem occurs: troubleshooting techniques to help identify the problem
Post migration
How to find a solution: using IBM Self-Help tools and support
What is next: typical next steps
Related publications
IBM Redbooks publications
Other publications
How to get IBM Redbooks publications
Help from IBM
0 of .
Results for:
No results containing your search query
P. 1


Ratings: (0)|Views: 19 |Likes:
Published by sam_r251

More info:

Published by: sam_r251 on Aug 29, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 5 to 70 are not shown in this preview.
You're Reading a Free Preview
Pages 75 to 107 are not shown in this preview.
You're Reading a Free Preview
Pages 112 to 146 are not shown in this preview.
You're Reading a Free Preview
Pages 151 to 154 are not shown in this preview.
You're Reading a Free Preview
Pages 159 to 242 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->