• Securing applications and their environment
    • Security overview
    • Security considerations during installation
      • Creating basic authentication information at install time
        • Creating WebSphere Process Server profiles with security
    • Setting up WebSphere Process Server security
      • Setting up security for a stand-alone WebSphere Process Server
      • Setting up security for a Network Deployment environment
      • Configuring Lightweight Directory Access Protocol (LDAP) as the user registry
    • Authentication
      • Modifying authentication aliases
      • Business process choreographer authentication aliases
      • Common Event Infrastructure authentication aliases
      • Service component architecture authentication aliases
    • Access control
      • Developing secure components
      • Access control in business process and human task applications
      • Access control in Common Event Infrastructure applications
    • Security and the Common Event Infrastructure
    • Securing the enterprise service bus
      • Security considerations for service integration buses
      • Learning about security
      • Planning your security requirements
      • Administering messaging security
      • Tips for troubleshooting service integration bus security
    • Securing adapters
    • Security in Business Process Choreographer tasks and processes
    • Network Deployment security considerations
    • Tutorial: Writing a Jacl script that lists security roles
      • Exercise: Writing a Jacl script