
Chapter 5 Security Configuration
Jaguar security management overview
You can configure Jaguar to accept client connections over
secure protocols IIOPS and HTTPS using:
- Security
Manager to manage key pairs and certificates for Jaguar.
See "Security Manager tasks" for
more information about Security Manager.
- Jaguar Manager to define security profiles that
establish various levels of security on Jaguar and assign them to
a listener. Profiles allow you to determine:
- Client
and server authentication requirements
- Encryption and decryption algorithms
See "Security profiles" and "Listeners" for information
on establishing security profiles and assigning them to Jaguar listeners.
- Jaguar to use certificates and listeners to authenticate
clients, if necessary, and encrypt and decrypt data.
Copyright © 2000 Sybase, Inc. All rights reserved.
|
|