This section does not apply to z/OS. Refer to Setting up z/OS security and Summary of required access (z/OS) for information about setting up broker domain security on z/OS.
You can use these steps as a security checklist. Each step comprises a list of questions about the security tasks to consider for your broker configuration. The answers to the questions provide the security information that you need to configure your WebSphere Business Integration Message Broker components and also give you information about other security controls that you might want to deploy.
The following steps show you what to do the first time you install WebSphere Business Integration Message Broker.
To set up security for your broker domain, begin with Planning for security when you install WebSphere Business Integration Message Broker and follow links from there.
Notices |
Trademarks |
Downloads |
Library |
Support |
Feedback
![]() ![]() |
ap03980_ |