A Java Proxy provides facilities to implement Distributed Processing Security.
Note: For more information about implementation of Distributed Processing Security, see the User Exit Reference Guide.
By default, the Java Proxy does not exploit the use of the Proxy Runtime security features. To utilize the security features, the application developer must add code to their Java application that sets the ClientID and ClientPassword properties of the Java Proxy's Import view object. Depending on the return value of the client security user exit, the security data fields are sent to the target Distributed Processing Server (DPS). Additionally, if the client security user exit returns SECURITY_ENHANCED, the client security user exits can add an optional security token to the data flow. The user exits residing in the execution environment of the target DPS validate the collection of security data that is sent as part of the cooperative flow.
Note: For a Java Proxy flowing to a DPS using TCP/IP, MQSeries, or ECI, the supporting runtime lets a portion of the Common Format Buffer (CFB) to be encrypted on the way to the target DPS and decrypted on the way back from the target DPS. User exits enable the use of encryption and decryption.
|
Copyright © 2015 CA Technologies.
All rights reserved.
|
|