Configuring micro broker securityAdded by IBM on October 5, 2011 | Version 1 (Original)
|Security within micro broker is composed of three parts, each of which must be considered when configuring the system.
Security within micro broker is composed of three parts, each of which must be considered when configuring the system.
Configuring micro broker encryptionParent topic: Creating and running a micro broker
The micro broker security features (available with IBM
® Expeditor) allow system implementers to secure both access and communications to and from the micro broker. This ability includes the encryption of data as it is transmitted over the network using industry-standard SSL/TLS (Secure Sockets Layer and Transport Layer Security) protocols.
Configuring micro broker authentication
The micro broker uses the Java
™ Authentication and Authorization Service (JAAS) to authenticate clients.
Configuring micro broker authorization
The micro broker uses a policy-based authorization scheme.