Securing applications and their environment
Security overview
Security considerations during installation
Creating basic authentication information at install time
Creating WebSphere Process Server profiles with security
Setting up WebSphere Process Server security
Setting up security for a stand-alone WebSphere Process Server
Setting up security for a Network Deployment environment
Configuring Lightweight Directory Access Protocol (LDAP) as the user registry
Authentication
Modifying authentication aliases
Business process choreographer authentication aliases
Common Event Infrastructure authentication aliases
Service component architecture authentication aliases
Access control
Developing secure components
Access control in business process and human task applications
Access control in Common Event Infrastructure applications
Security and the Common Event Infrastructure
Securing the enterprise service bus
Security considerations for service integration buses
Learning about security
Planning your security requirements
Administering messaging security
Tips for troubleshooting service integration bus security
Securing adapters
Security in Business Process Choreographer tasks and processes
Network Deployment security considerations
Tutorial: Writing a Jacl script that lists security roles
Exercise: Writing a Jacl script