Previous Topic: Network ConsiderationsNext Topic: Message Protection


Resource Protection

To protect resources, identifying who accesses the resources is critical. The security system requires client (user) identification, also known as authentication. In a distributed network supported by WebSphere for z/OS, clients can access resources from:

Clients can request a service that requires a server to forward the request to another server. In such cases the system must handle delegation (the availability of the client identity for use by intermediate servers and target servers).