This topic introduces the tasks involved in setting up security on a message flow. You can configure the broker to perform end to end processing of an identity carried in a message through a message flow. This enables administrators to configure security at flow level to control access based on the identity flowed in a message, and to provide a security mechanism that is both transport independent and message format independent.