Setting up broker domain security

This section introduces the things to consider when you are setting up security for a broker configuration running on Windows, Linux, or UNIX platforms.

For an introduction to various aspects of security, see Security overview.

This section does not apply to z/OS. Refer to Setting up z/OS security and Summary of required access (z/OS) for information about setting up broker domain security on z/OS.

Before you start setting up security for your broker domain, refer to Planning for security when you install WebSphere Event Broker, which contains links to security information that you need before, during, and after installation of WebSphere Event Broker.

You can use the following list of tasks as a security checklist. Each item comprises a list of reminders or questions about the security tasks to consider for your broker configuration. The answers to the questions provide the security information that you need to configure your WebSphere Event Broker components and also give you information about other security controls that you might want to deploy.

Related tasks
Planning for security when you install WebSphere Event Broker
Considering security for a broker
Considering security for a Configuration Manager
Considering security for the workbench
Enabling topic-based security
Setting up z/OS security
Related reference
Security requirements for Windows platforms
Security requirements for Linux and UNIX platforms
Summary of required access (z/OS)