Set up security on UNIX, Linux, and Windows

Security considerations specific to UNIX, Linux, and Windows systems.

IBM MQ queue managers transfer information that is potentially valuable, so we need to use an authority system to ensure that unauthorized users cannot access your queue managers. Consider the following types of security controls:

    Who can administer IBM MQ
    We can define the set of users who can issue commands to administer IBM MQ.

    Who can use IBM MQ objects
    We can define which users (usually applications) can use MQI calls and PCF commands to do the following:

    • Who can connect to a queue manager.
    • Who can access objects (queues, process definitions, namelists, channels, client connection channels, listeners, services, and authentication information objects), and what type of access they have to those objects.
    • Who can access IBM MQ messages.
    • Who can access the context information associated with a message.

    Channel security
    We need to ensure that channels used to send messages to remote systems can access the required resources.

We can use standard operating facilities to grant access to program libraries, MQI link libraries, and commands. However, the directory containing queues and other queue manager data is private to IBM MQ; do not use standard operating system commands to grant or revoke authorizations to MQI resources.

Parent topic: Set up security