Start of change
WebSphere Message Brokers
File: ap04070_
Writer: Stephanie J Strugnell

Concept topic

This build: July 31, 2007 21:34:46

Security profiles

A security profile defines the security operations to be performed by input and output nodes.

Security profiles contain values for the following properties:

Authentication
Defines the type of authentication that is performed on the source identity. This property applies to input nodes. For more information, see Authentication.
AuthenticationConfig
This is a provider-specific configuration string. It typically defines the information that the authentication client needs to connect to the provider, and the information needed to look up the identity tokens. This property applies to input nodes.
Mapping
Defines the type of mapping that is performed on the source identity. This property applies to input nodes. For more information, see Identity mapping.
MappingConfig
This is a provider-specific configuration string. It typically defines how the client connects to the provider, and contains additional information required to look up the mapping routine. This property applies to input nodes.
Authorization
Defines the types of authorization checks that are performed on the mapped or source identity. This property applies to input nodes. For more information, see Authorization.
AuthorizationConfig
This is a provider-specific configuration string. It typically provides information on how to connect to the provider, and also some information that can be used to check access (for example, a group that can be checked for membership). This property applies to input nodes.
Propagation
Enables or disables identity propagation on output and request nodes. For more information, see Identity propagation.

For information on configuring a security profile for LDAP or TFIM, see Configuring a security profile.

Related concepts
Identity
Authentication
Identity mapping
Authorization
Identity propagation
Security exception processing
Related tasks
Configuring identity
Configuring authentication
Configuring identity mapping
Configuring a security profile
Configuring authorization
Configuring a message flow for identity propagation
Setting up message flow security
Related reference
mqsicreateconfigurableservice command
mqsideleteconfigurableservice command
mqsichangeproperties command
mqsireportproperties command
MQInput node
HTTPInput node
HTTPRequest node
MQOutput node
Notices | Trademarks | Downloads | Library | Support | Feedback

Copyright IBM Corporation 1999, 2007Copyright IBM Corporation 1999, 2007. All Rights Reserved.
This build: July 31, 2007 21:34:46

ap04070_ This topic's URL is:
End of change