User guide
Chapter 1: Security Risks
1-20
Resources to be Protected
The following table lists the resources when an OLTP application is used. If high security is required, it
is desirable to protect these resources.
Table 1-9 Resources to be Protected
Function Resource to be protected
User authentication Password used for authentication
Invocation of the CORBA application Log file for CORBA service
Implementation Repository file
Output file for the CORBA WorkUnit
Log file for standard output
Log file for standard error output
Invocation of the transaction application Error log file
WorkUnit definition
Output file for the transaction application
Standard output file for the file transaction application
Standard error output file for the transaction
application
Access to Naming Service Data file for Naming Service
Access to Interface Repository Data file for Interface Repository
Access to the load balance Naming Service for load balance
Interstage environment setup Definitions related to Interstage
Interstage system definition file
Interstage operating environment file
CORBA Service operating environment file
Component Transaction Service environment
definition file
Registration and deletion of the WorkUnit
definition
WorkUnit definition