LDAP Authentication for IBM DS8000 Systems: Updated for DS8000 Release 9.1

Download LDAP Authentication for IBM DS8000 Systems: Updated for DS8000 Release 9.1 PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738459488
Total Pages : 216 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis LDAP Authentication for IBM DS8000 Systems: Updated for DS8000 Release 9.1 by : Bjoern Wesselbaum

Download or read book LDAP Authentication for IBM DS8000 Systems: Updated for DS8000 Release 9.1 written by Bjoern Wesselbaum and published by IBM Redbooks. This book was released on 2021-03-08 with total page 216 pages. Available in PDF, EPUB and Kindle. Book excerpt: The IBM® DS8000® series includes the option to replace the locally based user ID and password authentication with a centralized directory-based approach. This IBM Redpaper publication helps DS8000 storage administrators understand the concepts and benefits of a centralized directory. It provides the information that is required for implementing a DS8000 authentication mechanism that is based on the Lightweight Directory Access Protocol (LDAP). Starting with DS8000 Release 9.1 code, a simpler, native LDAP authentication method is supported along with the former implementation that relies on IBM Copy Services Manager (CSM) acting as a proxy between the DS8000 and external LDAP servers. Note that examples and operations shown in this Redpaper refer to the DS8000 R9.1 SP1, code release bundle 89.11.33.0.

Enabling LDAP for IBM FlashSystem A9000 and A9000R with Microsoft Active Directory

Download Enabling LDAP for IBM FlashSystem A9000 and A9000R with Microsoft Active Directory PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738455849
Total Pages : 28 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Enabling LDAP for IBM FlashSystem A9000 and A9000R with Microsoft Active Directory by : Andrew Greenfield

Download or read book Enabling LDAP for IBM FlashSystem A9000 and A9000R with Microsoft Active Directory written by Andrew Greenfield and published by IBM Redbooks. This book was released on 2017-06-26 with total page 28 pages. Available in PDF, EPUB and Kindle. Book excerpt: Updated on May 1st, 2017 You can enable user authentication for IBM® FlashSystem A9000 and FlashSystem A9000R for use with Microsoft Windows Active Directory (AD). AD is Microsoft Windows implementation of the Lightweight Directory Access Protocol (LDAP). The benefits of an LDAP-based centralized user management can be substantial when you consider the size and complexity of the overall IT environment. Maintaining local user credential repositories is straightforward and convenient when you work with only a few users and a few storage systems. However, as the number of users and interconnected systems grows, the complexity of user account management rapidly increases, and managing this environment is time-consuming. This IBM RedpaperTM publication explores various benefits of this approach. Although the benefits from using AD are significant, you must also evaluate the substantial planning effort and added complexity of deploying an LDAP infrastructure if it is not already in place.

IBM DS8000 Copy Services: Updated for IBM DS8000 Release 9.1

Download IBM DS8000 Copy Services: Updated for IBM DS8000 Release 9.1 PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738459577
Total Pages : 626 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM DS8000 Copy Services: Updated for IBM DS8000 Release 9.1 by : Bertrand Dufrasne

Download or read book IBM DS8000 Copy Services: Updated for IBM DS8000 Release 9.1 written by Bertrand Dufrasne and published by IBM Redbooks. This book was released on 2023-01-27 with total page 626 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication helps you plan, install, configure, and manage Copy Services on the IBM DS8000® operating in an IBM Z® or Open Systems environment. This book helps you design and implement a new Copy Services installation or migrate from an existing installation. It includes hints and tips to maximize the effectiveness of your installation, and information about tools and products to automate Copy Services functions. It is intended for anyone who needs a detailed and practical understanding of the DS8000 Copy Services. This edition is an update for the DS8900 Release 9.1. Note that the Safeguarded Copy feature is covered in IBM DS8000 Safeguarded Copy, REDP-5506.

IBM Copy Services Manager Implementation Guide

Download IBM Copy Services Manager Implementation Guide PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : pages
Book Rating : 4.:/5 (1 download)

DOWNLOAD NOW!


Book Synopsis IBM Copy Services Manager Implementation Guide by : William Rooney

Download or read book IBM Copy Services Manager Implementation Guide written by William Rooney and published by . This book was released on 2017 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt:

IBM TS7700 Series DS8000 Object Store User's Guide Version 2.0

Download IBM TS7700 Series DS8000 Object Store User's Guide Version 2.0 PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738459542
Total Pages : 36 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM TS7700 Series DS8000 Object Store User's Guide Version 2.0 by : Lourie Goodall

Download or read book IBM TS7700 Series DS8000 Object Store User's Guide Version 2.0 written by Lourie Goodall and published by IBM Redbooks. This book was released on 2021-03-22 with total page 36 pages. Available in PDF, EPUB and Kindle. Book excerpt: The IBM® TS7700 features a functional enhancement that allows for the TS7700 to act as an object store for transparent cloud tiering with IBM DS8000® (DS8K), DFSMShsm (HSM), and native DFSMSdss (DSS). This function can be used to move data sets directly from DS8000 to TS7700. This IBM Redpaper publication describes the client value, and how DFSMS, DS8000, and TS7700 are set up to enable and use the function.

I/O Configuration Using z/OS HCD and HCM

Download I/O Configuration Using z/OS HCD and HCM PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738434213
Total Pages : 462 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis I/O Configuration Using z/OS HCD and HCM by : Karan Singh

Download or read book I/O Configuration Using z/OS HCD and HCM written by Karan Singh and published by IBM Redbooks. This book was released on 2010-05-18 with total page 462 pages. Available in PDF, EPUB and Kindle. Book excerpt: IBM® System z® servers offer a full range of connectivity options for attaching peripheral or internal devices for input and output to the server. At the other end of these connections are a variety of devices for data storage, printing, terminal I/O, and network routing. This combination of connectivity and hardware offer System z customers solutions to meet most connectivity requirements. However, to make use of these features, the System z server must be properly configured. This IBM Redbooks® publication takes a high-level look at the tools and processes involved in configuring a System z server. We provide an introduction to the System z channel subsystem and the terminology frequently used in the hardware definition process. We examine the features and functions of tools used in the hardware definition process, such as HCD, CHPID Mapping Tool, and HCM. We discuss the input and output of these tools (IODF, IOCP, IOCDS) and their relationship to one another. We also provide a high-level overview of the hardware configuration process (the flow of generating a valid I/O configuration). We provide configuration examples using both HCD and HCM. The book also discusses available new functions and guidelines for the effective use of HCD and HCM. This document is intended for system programmers and administrators who are responsible for defining and activating hardware changes to z/OS® and System z servers, and for the IBM representatives who need this information. General knowledge of z/OS and IOCP is assumed.

IBM Spectrum Family: IBM Spectrum Control Standard Edition

Download IBM Spectrum Family: IBM Spectrum Control Standard Edition PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738441481
Total Pages : 286 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM Spectrum Family: IBM Spectrum Control Standard Edition by : Karen Orlando

Download or read book IBM Spectrum Family: IBM Spectrum Control Standard Edition written by Karen Orlando and published by IBM Redbooks. This book was released on 2016-03-15 with total page 286 pages. Available in PDF, EPUB and Kindle. Book excerpt: IBM® Spectrum Control (Spectrum Control), a member of the IBM SpectrumTM Family of products, is the next-generation data management solution for software-defined environments (SDEs). With support for block, file, object workloads, and software-defined storage and predictive analytics, and automated and advanced monitoring to identify proactively storage performance problems, Spectrum Control enables administrators to provide efficient management for heterogeneous storage environments. IBM Spectrum ControlTM (formerly IBM Tivoli® Storage Productivity Center) delivers a complete set of functions to manage IBM Spectrum VirtualizeTM, IBM Spectrum AccelerateTM, and IBM Spectrum ScaleTM storage infrastructures, and traditional IBM and select third-party storage hardware systems. This IBM Redbooks® publication provides practical examples and use cases that can be deployed with IBM Spectrum Control Standard Edition, with an overview of IBM Spectrum Control Advanced Edition. This book complements the Spectrum Control IBM Knowledge Center, which is referenced for product details, and for installation and implementation details throughout this book. You can find this resource at the following website: IBM Spectrum Control Knowledge Center Also provided are descriptions and an architectural overview of the IBM Spectrum Family, highlighting Spectrum Control, as integrated into software-defined storage environments. This publication is intended for storage administrators, clients who are responsible for maintaining IT and business infrastructures, and anyone who wants to learn more about employing Spectrum Control and Spectrum Control Standard Edition.

Best Practices for DS8000 and z/OS HyperSwap with Copy Services Manager

Download Best Practices for DS8000 and z/OS HyperSwap with Copy Services Manager PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738457612
Total Pages : 206 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Best Practices for DS8000 and z/OS HyperSwap with Copy Services Manager by : Thomas Luther

Download or read book Best Practices for DS8000 and z/OS HyperSwap with Copy Services Manager written by Thomas Luther and published by IBM Redbooks. This book was released on 2019-06-21 with total page 206 pages. Available in PDF, EPUB and Kindle. Book excerpt: Many IBM® z/OS® customers require their applications to be available 24x7. Whether the business requirements are high availability (HA), disaster recovery (DR), or business continuity, IBM HyperSwap® technology can provide an adequate solution. HyperSwap is the industry standard and is provided as several different implementation options to meet the various business needs of the IBM System z® and z/OS customer base. IBM Copy Services Manager (CSM) enables you to manage z/OS HyperSwap and helps you manage planned and unplanned actions in an z/OS environment from an open systems environment. This IBM Redbooks® publication provides best practices for the planning, implementing, integrating, and managing z/OS HyperSwap with CSM.

Getting Started with z/OS Data Set Encryption

Download Getting Started with z/OS Data Set Encryption PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738460222
Total Pages : 274 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Getting Started with z/OS Data Set Encryption by : Bill White

Download or read book Getting Started with z/OS Data Set Encryption written by Bill White and published by IBM Redbooks. This book was released on 2021-12-10 with total page 274 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

IBM PowerVC Version 2.0 Introduction and Configuration

Download IBM PowerVC Version 2.0 Introduction and Configuration PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738459739
Total Pages : 368 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM PowerVC Version 2.0 Introduction and Configuration by : Scott Vetter

Download or read book IBM PowerVC Version 2.0 Introduction and Configuration written by Scott Vetter and published by IBM Redbooks. This book was released on 2021-05-26 with total page 368 pages. Available in PDF, EPUB and Kindle. Book excerpt: IBM® Power Virtualization Center (IBM® PowerVCTM) is an advanced enterprise virtualization management offering for IBM Power Systems. This IBM Redbooks® publication introduces IBM PowerVC and helps you understand its functions, planning, installation, and setup. It also shows how IBM PowerVC can integrate with systems management tools such as Ansible or Terraform and that it also integrates well into a OpenShift container environment. IBM PowerVC Version 2.0.0 supports both large and small deployments, either by managing IBM PowerVM® that is controlled by the Hardware Management Console (HMC), or by IBM PowerVM NovaLink. With this capability, IBM PowerVC can manage IBM AIX®, IBM i, and Linux workloads that run on IBM POWER® hardware. IBM PowerVC is available as a Standard Edition, or as a Private Cloud Edition. IBM PowerVC includes the following features and benefits: Virtual image capture, import, export, deployment, and management Policy-based virtual machine (VM) placement to improve server usage Snapshots and cloning of VMs or volumes for backup or testing purposes Support of advanced storage capabilities such as IBM SVC vdisk mirroring of IBM Global Mirror Management of real-time optimization and VM resilience to increase productivity VM Mobility with placement policies to reduce the burden on IT staff in a simple-to-install and easy-to-use graphical user interface (GUI) Automated Simplified Remote Restart for improved availability of VMs ifor when a host is down Role-based security policies to ensure a secure environment for common tasks The ability to enable an administrator to enable Dynamic Resource Optimization on a schedule IBM PowerVC Private Cloud Edition includes all of the IBM PowerVC Standard Edition features and enhancements: A self-service portal that allows the provisioning of new VMs without direct system administrator intervention. There is an option for policy approvals for the requests that are received from the self-service portal. Pre-built deploy templates that are set up by the cloud administrator that simplify the deployment of VMs by the cloud user. Cloud management policies that simplify management of cloud deployments. Metering data that can be used for chargeback. This publication is for experienced users of IBM PowerVM and other virtualization solutions who want to understand and implement the next generation of enterprise virtualization management for Power Systems. Unless stated otherwise, the content of this publication refers to IBM PowerVC Version 2.0.0.

IBM System Storage DS8700 Architecture and Implementation

Download IBM System Storage DS8700 Architecture and Implementation PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738434620
Total Pages : 630 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM System Storage DS8700 Architecture and Implementation by : Bertrand Dufrasne

Download or read book IBM System Storage DS8700 Architecture and Implementation written by Bertrand Dufrasne and published by IBM Redbooks. This book was released on 2011-02-12 with total page 630 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM System Storage® DS8700 storage subsystem. This book has reference information that will help you plan for, install, and configure the DS8700 and also discusses the architecture and components. The DS8700 is the most advanced model in the IBM System Storage DS8000® series. It includes IBM POWER6®-based controllers, with a dual 2-way or dual 4-way processor complex implementation. Its extended connectivity, with up to 128 Fibre Channel/FICON® ports for host connections, make it suitable for multiple server environments in both open systems and IBM System z® environments. If desired, the DS8700 can be integrated in an LDAP infrastructure. The DS8700 supports thin provisioning. Depending on your specific needs, the DS8700 storage subsystem can be equipped with SATA drives, FC drives, and Solid® State Drives (SSDs). The DS8700 can now automatically optimize the use of SSD drives through its no charge Easy Tier feature. The DS8700 also supports Full Disk Encryption (FDE) feature. Its switched Fibre Channel architecture, dual processor complex implementation, high availability design, and the advanced Point-in-Time Copy and Remote Mirror and Copy functions that incorporates make the DS8700 storage subsystem suitable for mission-critical business functions.

IBM Power Systems SR-IOV: Technical Overview and Introduction

Download IBM Power Systems SR-IOV: Technical Overview and Introduction PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 073845379X
Total Pages : 86 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM Power Systems SR-IOV: Technical Overview and Introduction by : Scott Vetter

Download or read book IBM Power Systems SR-IOV: Technical Overview and Introduction written by Scott Vetter and published by IBM Redbooks. This book was released on 2017-01-12 with total page 86 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® RedpaperTM publication describes the adapter-based virtualization capabilities that are being deployed in high-end IBM POWER7+TM processor-based servers. Peripheral Component Interconnect Express (PCIe) single root I/O virtualization (SR-IOV) is a virtualization technology on IBM Power Systems servers. SR-IOV allows multiple logical partitions (LPARs) to share a PCIe adapter with little or no run time involvement of a hypervisor or other virtualization intermediary. SR-IOV does not replace the existing virtualization capabilities that are offered as part of the IBM PowerVM® offerings. Rather, SR-IOV compliments them with additional capabilities. This paper describes many aspects of the SR-IOV technology, including: A comparison of SR-IOV with standard virtualization technology Overall benefits of SR-IOV Architectural overview of SR-IOV Planning requirements SR-IOV deployment models that use standard I/O virtualization Configuring the adapter for dedicated or shared modes Tips for maintaining and troubleshooting your system Scenarios for configuring your system This paper is directed to clients, IBM Business Partners, and system administrators who are involved with planning, deploying, configuring, and maintaining key virtualization technologies.

Security on IBM z/VSE

Download Security on IBM z/VSE PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738456918
Total Pages : 440 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Security on IBM z/VSE by : Helmut Hellner

Download or read book Security on IBM z/VSE written by Helmut Hellner and published by IBM Redbooks. This book was released on 2018-06-14 with total page 440 pages. Available in PDF, EPUB and Kindle. Book excerpt: One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from various sources. Insider threats and malicious hackers are not only difficult to detect and prevent, they might be using resources with the business being unaware. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security that is provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security.

IBM DS8880 Architecture and Implementation (Release 8.51)

Download IBM DS8880 Architecture and Implementation (Release 8.51) PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738457280
Total Pages : 512 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM DS8880 Architecture and Implementation (Release 8.51) by : Bert Dufrasne

Download or read book IBM DS8880 Architecture and Implementation (Release 8.51) written by Bert Dufrasne and published by IBM Redbooks. This book was released on 2019-02-26 with total page 512 pages. Available in PDF, EPUB and Kindle. Book excerpt: Updated for R8.51 This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM DS8880 family. The book provides reference information to assist readers who need to plan for, install, and configure the DS8880 systems. The IBM DS8000® family is a high-performance, high-capacity, highly secure, and resilient series of disk storage systems. The DS8880 family is the latest and most advanced of the DS8000 offerings to date. The high availability, multiplatform support, including IBM Z, and simplified management tools help provide a cost-effective path to an on-demand and cloud-based infrastructures. The IBM DS8880 family now offers business-critical, all-flash, and hybrid data systems that span a wide range of price points: DS8882F: Rack Mounted storage system DS8884: Business Class DS8886: Enterprise Class DS8888: Analytics Class The DS8884 and DS8886 are available as either hybrid models, or can be configured as all-flash. Each model represents the most recent in this series of high-performance, high-capacity, flexible, and resilient storage systems. These systems are intended to address the needs of the most demanding clients. Two powerful IBM POWER8® processor-based servers manage the cache to streamline disk I/O, maximizing performance and throughput. These capabilities are further enhanced with the availability of the second generation of high-performance flash enclosures (HPFEs Gen-2) and newer flash drives. Like its predecessors, the DS8880 supports advanced disaster recovery (DR) solutions, business continuity solutions, and thin provisioning. All disk drives in the DS8880 storage system include the Full Disk Encryption (FDE) feature. The DS8880 can automatically optimize the use of each storage tier, particularly flash drives, by using the IBM Easy Tier® feature. Release 8.5 introduces the Safeguarded Copy feature. The DS8882F Rack Mounted is decribed in a separate publication, Introducing the IBM DS8882F Rack Mounted Storage System, REDP-5505.

IBM Storage Networking c-type FICON Implementation Guide

Download IBM Storage Networking c-type FICON Implementation Guide PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738460214
Total Pages : 452 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM Storage Networking c-type FICON Implementation Guide by : William White

Download or read book IBM Storage Networking c-type FICON Implementation Guide written by William White and published by IBM Redbooks. This book was released on 2022-01-11 with total page 452 pages. Available in PDF, EPUB and Kindle. Book excerpt: The next-generation IBM® c-type Directors and switches for IBM Storage Networking provides high-speed Fibre Channel (FC) and IBM Fibre Connection (IBM FICON®) connectivity from the IBM Z® platform to the storage area network (SAN) core. It enables enterprises to rapidly deploy high-density virtualized servers with the dual benefit of higher bandwidth and consolidation. This IBM Redpaper Redbooks publication helps administrators understand how to implement or migrate to an IBM c-type SAN environment. It provides an overview of the key hardware and software products, and it explains how to install, configure, monitor, tune, and troubleshoot your SAN environment.

IBM DS8880 Product Guide (Release 8.51)

Download IBM DS8880 Product Guide (Release 8.51) PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738457361
Total Pages : 48 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM DS8880 Product Guide (Release 8.51) by : Bert Dufrasne

Download or read book IBM DS8880 Product Guide (Release 8.51) written by Bert Dufrasne and published by IBM Redbooks. This book was released on 2019-01-02 with total page 48 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM Redbooks® Product Guide gives an overview of the features and functions that are available with the IBM DS8880 models running microcode Release 8.51 (DS8000 License Machine Code 8.8.51.xx.xx). The IBM DS8880 architecture relies on powerful IBM POWER8® processor-based servers that manage the cache to streamline disk input/output (I/O), maximizing performance and throughput. These capabilities are further enhanced with the availability of the second generation of high-performance flash enclosures (HPFE Gen-2). The IBM DS8888, DS8886, and DS8884 models excel at supporting the IBM Z Enterprise server and IBM Power server environments, offering many synergy features.

Security on z/VM

Download Security on z/VM PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738488542
Total Pages : 348 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Security on z/VM by : Paola Bari

Download or read book Security on z/VM written by Paola Bari and published by IBM Redbooks. This book was released on 2007-12-05 with total page 348 pages. Available in PDF, EPUB and Kindle. Book excerpt: Discussions about server sprawl, rising software costs, going green, or moving data centers to reduce the cost of business are held in many meetings or conference calls in many organizations throughout the world. And many organizations are starting to turn toward System zTM and z/VM® after such discussions. The virtual machine operating system has over 40 years of experience as a hosting platform for servers, from the days of VM/SP, VM/XA, VM/ESA® and especially now with z/VM. With the consolidation of servers and conservative estimates that approximately seventy percent of all critical corporate data reside on System z, we find ourselves needing a highly secure environment for the support of this infrastructure. This document was written to assist z/VM support and security personnel in providing the enterprise with a safe, secure and manageable environment. This IBM® Redbooks® publication provides an overview of security and integrity provided by z/VM and the processes for the implementation and configuration of z/VM Security Server, z/VM LDAP Server, IBM Tivoli® Directory Server for z/OS®, and Linux® on System z with PAM for LDAP authentication. Sample scenarios with RACF® database sharing between z/VM and z/OS, or through Tivoli Directory Integrator to synchronize LDAP databases, are also discussed in this book. This book provides information about configuration and usage of Linux on System z with the System z Cryptographic features documenting their hardware and software configuration. The Consul zSecure Pro Suite is also part of this document: this product helps to control and audit security not only on one system, but can be used as a single point of enterprise wide security control. This document covers the installation and configuration of this product and detailed information is presented on how z/Consul can be used to collect and analyze z/VM security data and how it can be helpful in the administration of your audit data.