All docs This doc
JMS is an integral part of enterprise integration solutions that are highly-reliable, loosely-coupled and asynchronous. As a result, implementing proper security to your JMS deployments is vital. This document discusses some of the best practices of an effective JMS security implementation, when used in combination with WSO2 ESB.
Let's see how some of the key concepts of system security such as authentication, authorization and availability are implemented in different types of broker servers.