Securing the point-to-point topology
Secure the point-to-point topology so that messages can be transmitted in a production environment.
About this task
Secure the source and target queue manager objects so that the correct level of access is granted. Define which user groups have access to the queues and queue managers. Secure the network connection by using digitally signed certificates to connect using Transport Layer Security (TLS).
- Securing the source queue manager objects
Set the authorization values for the objects on the source queue manager.- Securing the target queue manager objects
Set the authorization values for the objects on the target queue manager.- Securing the network
Secure the network connections between the source and remote queue managers.Parent topic: Point-to-point scenario