This documentation is for WSO2 Enterprise Integrator version 6.2.0 . View documentation for the latest release in the 6.x.x family and the latest release in the 7.x.x family.

All docs This doc
Skip to end of metadata
Go to start of metadata

JMS is an integral part of enterprise integration solutions that are highly-reliable, loosely-coupled and asynchronous. As a result, implementing proper security to your JMS deployments is vital. This document discusses some of the best practices of an effective JMS security implementation, when used in combination with WSO2 Enterprise Integrator.

Let's see how some of the key concepts of system security such as authentication, authorization and availability are implemented in different types of broker servers.



  • No labels