User guide
Security System Guide - Index
Index-3
parameters, 4-8
setup, 4-8
writing HTML, 4-7
HTTP Tunneling Setup, 4-4
HTTP-IIOP gateway, 4-4
IJServer
execution, 2-23
security measures, 2-23
unauthorized resource file access, 2-23
Implementing an Application that Attaches a SOAP
Digital Signature, 15-9
Implementing an Application that Performs
Decryption Using the XML Encryption, 15-20
Implementing an Application that Performs Encryption
Using the XML Encryption, 15-16
Implementing an Application that Performs User
Authentication on SOAP Messages, 15-4
Implementing an Application that Verifies the SOAP
Digital Signature, 15-13
Implementing an Application to Append a User Name
and a Password, 15-2
Infodirectory
user registration, B-6
InfoDirectory, B-14
API object wrapping, B-2
running Interstage, B-15
Infodirectory Server
authentication requests, B-7
operational design, B-5
InfoProvider Pro
content permissions, 2-9
environment definition file permissions, 2-9
security measures, 2-9
user authentication, 2-9
Initializing Interstage, A-10
Interstage
access control, B-4
user authentication, B-2
Interstage certificate environment
configuring, 7-5
setting and use of, 7-1
Interstage HTTP Server
communication data, 2-4
DoS attacks, 2-4
HTTP trace method exploitation, 2-6
password information linkage, 2-5
security measures, 2-4
unauthorized resource file access, 2-5
Interstage installation resources
security, 2-2
Interstage JMS
environment setup, 11-4
security measures, 2-17
unauthorized resource file access, 2-17
Interstage Management Console
resources protected, 1-2
security, 1-2
security risks, 1-3
threat countermeasures, 1-3
Interstage Management Console and Interstage
Operation Tool, 1-2
Interstage Operation Tool
communication data, 2-3
environment definition file permissions, 2-3
resources protected, 1-2
security, 1-2
security measures, 2-3
security risks, 1-3
threat countermeasures, 1-3
user accounts, 2-3
Interstage Single Sign-on, 1-28
applying patches, 1-34
configuration model, 1-28
operating and managing business server, 1-33
security, 1-28
security risks, 1-29
threat countermeasures, 1-30
IP access control, 3-3
J2EE Application, 1-5
J2EE applications
resources protected, 1-5
security, 1-5
security risks, 1-7