+

Search Tips | Advanced Search

Securing the point-to-point topology

Secure the point-to-point topology so that messages can be transmitted in a production environment.


About this task

Secure the source and target queue manager objects so that the correct level of access is granted. Define which user groups have access to the queues and queue managers. Secure the network connection by using digitally signed certificates to connect using Transport Layer Security (TLS).

Parent topic: Point-to-point scenario

Last updated: 2020-10-04