Planning for security when you install WebSphere Business Integration Event Broker

On Windows platforms, you can define user IDs up to 12 characters long. On UNIX platforms and on z/OS you are restricted to eight characters. If you have a mixed environment, ensure that your user IDs are not more than eight characters long.

Considering security when you install on Windows

Perform this task by considering the following steps:

  1. Choosing a user ID for installation
  2. Creating groups during installation
  3. Creating user IDs after installation
When complete, go to Considering security for a broker.

Choosing a user ID for installation

Ensure that the user ID with which you log on:

You cannot use the Administrator ID itself.

If you log on with a user ID that is more than eight characters long, you might have problems when you create databases.

Creating groups during installation

The following steps show you how to install WebSphere Business Integration Event Broker, whether or not you install on a domain controller.

Creating user IDs after installation

If you did not install WebSphere Business Integration Event Broker on a domain controller, and you installed on your workstation before creating the Domain mqbrkrs global group, ensure that you add the global group to the mqbrkrs local group manually.

When you are planning the administration of your broker configuration, consider defining user IDs for the following roles:

Considering security when you install on UNIX

Security control of WebSphere Business Integration Event Broker components, resources, and tasks depends on the definition of users and groups of users (principals) to the security subsystem of the operating system. WebSphere Business Integration Event Broker always creates a group mqbrkrs on the system on which it is installed.

Users must also have the appropriate authority to WebSphere MQ resources (queues and queue managers) and to the databases being used by the broker. Users on UNIX need appropriate authority to the WebSphere MQ resources on UNIX and to those on any remote queue managers (for example, the Configuration Manager on Windows). The Security requirements for UNIX platforms table provides a summary of authorizations in the UNIX environment.

Related tasks
Considering security for a broker
Enabling topic-based security
Considering security for a Configuration Manager

Related reference
Security requirements for Windows platforms
Security requirements for UNIX platforms