WebSphere MQ Security in an Enterprise Environment

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on May 07, 2003, updated May 09, 2003

  1. .PDF (4.1 MB)

Share this page:   

ISBN-10: 0738425621
ISBN-13: 9780738425627
IBM Form #: SG24-6814-00


Authors: Saida Davies and Peter Rhys-Jenkins Hazel Fix Mayumi Kawashima John Scanlan Steven Lane

    menu icon

    Abstract

    This IBM Redbooks publication considers an enterprise and describes some of the procedures and documentation that need to be developed to secure WebSphere MQ on the z/OS (zSeries), OS/400 (iSeries), IBM AIX (pSeries) and Windows 2000 (xSeries) platforms. This book also documents the before and after configurations needed to take advantage of the recent functional improvements to WebSphere MQ, such as the Secure Sockets Layer (SSL).

    Security is a complex subject. The first part of this book is intended to help the reader understand it. The second part lays out a business case scenario where the technology is implemented to secure WebSphere MQ.

    The book incorporates:

    - Cross-platform security, ascertaining the responsibility of identification and authentication.

    - Security issues when using WebSphere MQ over the Internet.

    - Securing of messages, taking advantage of the functional improvements to WebSphere MQ such as PKI and SSL.

    - Maintenance of message integrity by means of authentication and encryption.

    - Use of technologies external to WebSphere MQ, such as PKI, DCE, and RACF to solve the security concerns.

    The appendixes provide additional information, scripts, sample code and JCL related to the chapters in the book.

    Table of Contents

    Part 1. Enterprise security

    Chapter 1. Project overview

    Chapter 2. Planning

    Chapter 3. Security technologies

    Chapter 4. Platform security

    Chapter 5. IBM Tivoli Access Manager for Business Integration

    Part 2. Securing WebSphere MQ

    Chapter 6. Management issues

    Chapter 7. Business scenario

    Chapter 8. Business scenario architecture

    Chapter 9. Business scenario security configuration

    Chapter 10. Architectural vulnerabilities

    Chapter 11. Business scenario solution

    Appendix A. Good security practices

    Appendix B. Scripts, samples code and JCL

    Appendix C. Additional information

     

    Others who read this also read