This section includes the following topics:
Section 1.1, Deployment Models
Section 1.2, Access Manager Versus Access Manager Appliance
Section 1.3, Network Requirements
Section 1.4, Hardware Requirements
Section 1.5, Recommended Installation Scenarios
Section 1.6, Installing Access Manager Components in NAT Environments
Section 1.7, Setting Up Firewalls
Section 1.8, Protecting an Identity Server Through the Access Gateway