User guide

Security Measures for Interstage JMS
2-17
Security Measures for Interstage JMS
Interstage JMS can be used with the following products:
Interstage Application Server Enterprise Edition
Interstage Application Server Plus
Unauthorized Access to Resource Files
Interstage JMS Server has environment definition files as listed below:
JNDI definition file (fjmsjndi.ser.*) (*1)
JMS non-volatilization file (fjmsmng.ser.*, fjmsdsubXXXX.ser, lock\.XXXX) (*1)
Cluster environment definition file (fjmscluster.ser) (*1)
Console log (fjmsconsole.log)
*1 For the locations where the files are stored, refer to "Backing Up and Restoring Resources" -
"Outline and Applicable Resources" in Maintenance (Resource Backup) in the Operator's Guide.
These files may be exposed to the threat of unauthorized access from an ill-intentioned person.
To protect these files from this threat, make these files inaccessible by end users. For this purpose, it is
recommended to allow access only users having administrator authorization (superuser for a Solaris
OE/Linux system, and Administrator for Windows(R) system).
Security measures must also be taken for Event Service. For information about Event Service, refer to
Security Measures for Event Service.