Security and Security Administration

As described in the Administrator's Guide guide, the JMS server provides support for authentication, and access control. Users are authenticated when they create a JMS connection. Access control is done when the producers, consumers, and queue browsers are created on the connection, as well as when an administration function of the JMS server is accessed.

Securing a Queue

The example shows how to create users and groups, and build an ACL. It finally shows how to apply the ACL to a destination by using the Security Administration Remote APIs.

Using IIOP/SSL Communication

The example shows how to configure JMS clients and server to use SSL for secure and confidential communication.


Copyright © 1998-2003, Novell, Inc. All rights reserved.