Security considerations for the IMS bridge
There are four aspects that consider when deciding your security requirements for the IMS bridge, these are:
- What security authorization is needed to connect WebSphere MQ to IMS (Connecting to IMS)
- How much security checking is performed on applications using the bridge to access IMS (Application access control)
- Which IMS resources these applications are allowed to use (Security checking on IMS)
- What authority is to be used for messages that are put and got by the bridge (Security checking done by the bridge)
When you define your security requirements for the IMS bridge consider the following:
- Messages passing across the bridge might have originated from applications on platforms that do not offer strong security features
- Messages passing across the bridge might have originated from applications that are not controlled by the same enterprise or organization