This section does not apply to z/OS. Refer to Setting up z/OS security and Summary of required access (z/OS) for information about setting up broker domain security on z/OS.
You can use these steps as a security checklist. Each step comprises a list of questions about the security tasks to consider for your broker configuration. The answers to the questions provide the security information that you need to configure your WebSphere Business Integration Event Broker components and also give you information about other security controls that you might want to deploy.
The following steps show you what to do the first time you install WebSphere Business Integration Event Broker.
To set up security for your broker domain, begin with Planning for security when you install WebSphere Business Integration Event Broker and follow links from there.
Related tasks
Planning for security when you install WebSphere Business Integration Event Broker
Considering security for a broker
Enabling topic-based security
Considering security for a Configuration Manager
Considering security for the workbench
Setting up z/OS security
Related reference
Security requirements for Windows platforms
Security requirements for UNIX platforms
Summary of required access (z/OS)
Notices |
Trademarks |
Downloads |
Library |
Support |
Feedback
![]() ![]() |
ap03980_ |