Creating WebSphere Process Server profiles with security

You can take steps to secure your environment when you create a WebSphere Process Server profile. Alternatively you can provide the same information on the administrative console after you create the profile.

Why and when to perform this task

When you create a WebSphere Process Server profile using the profile creation wizard graphical user interface, there are three panels representing components, where you can enter user names and passwords for security purposes. The three components of WebSphere Process Server that permit you to enter these user names and passwords are the service component architecture (SCA), Business Process Choreographer, and the Common Event Infrastructure (CEI).

These user names and passwords are used to create authentication aliases and are required when you enable security. If you do not enter the user names and passwords when you create the profile, you can provide the same information using the administrative console, after you have created the profile.

Steps for this task

  1. On the Service Component Architecture configuration panel, provide an identity to be used to connect components to the Service Integration Bus in a secured mode.
    1. Select the Configure the Service Integration Bus in a secured mode check box.
    2. Enter a valid user name and password in the appropriate fields.
  2. On the Common Event Infrastructure Configuration panel provide an identity to be used to authenticate with WebSphere Messaging queue manager.

    Enter a valid user name and password in the appropriate fields.

  3. On the Business Process Choreographer Configuration panel, provide an identity for the sample Business Process Choreographer configuration to connect to the Service Integration Bus in a secured mode.
    1. Select the Configure a sample Business Process Choreographer check box.
    2. Enter a valid user name and password in the appropriate fields.
    3. Supply the name of the administrative group that will be permitted to administer Business Process Choreographer.

What to do next

More information about managing authentication aliases is provided in subsequent topics.

Related tasks
Modifying authentication aliases

Terms of use |

Last updated: Thu Apr 27 14:39:09 2006

(c) Copyright IBM Corporation 2006.
This information center is powered by Eclipse technology (http://www.eclipse.org)