• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

JMS Security

 
Greenhorn
Posts: 11
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
I am currently implementing security with JMS. Could you provide some guidance/advice on the type of security I am dealing with? Thanks in advance and looking forward to your response.
[ January 10, 2006: Message edited by: Bhavesh Ravjee ]
 
Author
Posts: 159
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Implementing JMS security is very much vendor specific...and we did discuss in our book. The most common JMS security options are:

- Enabling JMS Provider authentication and access control
- JMS Queues and Topics protection, so that the desinations are available for access to privileged applications
- JMS Message-level (Using Encryption and Digital signatures) and Transport-layer security (Using SSL).

One word of caution, these options are NOT defined by JMS standard specifications so it depends upon your JMS provider.

Refer to Chapter 5 - J2EE Security Architecture.

Goodluck

/Ramesh
[ January 11, 2006: Message edited by: Ramesh Nagappan ]
 
reply
    Bookmark Topic Watch Topic
  • New Topic