531: Controlling access to your IBM MQ systemRobert Parker
This presentation was originally presented at IBM TechCon 2021. In it we go through the various options in IBM MQ to secure your queue manager and control applications and users from accessing your vital configuration and data.
IBM MQ and Kafka, what is the difference?David Ware
Message queueing solutions used to be the one general purpose tool used for all asynchronous application patterns, then along came event streaming as an application model. To support this effectively needed a whole new approach to how messages are handled by the messaging technology. Now the tables are turned and many are wondering if an event streaming solution can be used for all their asynchronous application patterns from now on. But just as message queueing solutions work in a way to optimize for their core use cases, so do event streaming solutions, and these behaviors directly affect the applications that use them. This session picks IBM MQ and Kafka to look at how they compare and, more importantly, differ in their behavior so that you can decide which application scenarios are best suited by each. Spoiler -they're both good in their own way!
Enterprise messaging and IBM MQ is a critical part of any system, this session shows you how MQ is rapidly evolving to meet your needs. Irrespective of your platform or environment, this session introduces many of the updates to MQ in 2019 and 2020, whether that's in administration, building fault tolerant, scalable messaging solutions, or securing your systems.
Presented at MQ Technical Conference - 24th September 2018
Security features are important in any modern day application and MQ is no exception. In order to ensure user data is protected to the user's requirements applications must supply a variety of configurable security features. In this session we will be providing an introduction to all of IBM MQ's security features and a high level overview of why you would use them.
Basics of Kafka and IBM Cloud Event Streams. Includes all the major topics of Kafka, like Brokers, Clusters, Topics, Partitions, Producers, Consumers, Streams, and Connectors. What Event Stream offers more than just Kafka. Some difference between Kafka and IBM MQ.
MQ Guide France - IBM MQ and ContainersRobert Parker
IBM MQ certified containers allow MQ to be deployed in containerized environments like Kubernetes. The containers leverage features of IBM Cloud Private like centralized logging, monitoring, and metering. The certified containers also provide high availability and non-root user options to help secure MQ in container deployments.
High availability of a messaging system is essential. This is especially true for IBM MQ systems which are absolutely critical to the smooth running of many enterprises. IBM MQ Advanced made achieving high availability even easier with Replicated Data Queue Managers. Learn how this and other HA capabilities fits into a system that provides both high availability of the messaging system as a whole and every last piece of critical messaging data that you care about.
Intro video here - https://youtu.be/MWsoXPFHY5Q
Can you afford an outage? What happens if one occurs? IBM MQ brings you the capabilities to build active-active solutions for continuous availability and to scale out a system horizontally. This presentation shows you how to use MQ to its fullest, stepping away from single queue managers and utilising MQ clusters and the new Uniform Cluster pattern which automatically keeps your applications balanced, no matter what happens.
This document provides an overview of message-oriented middleware (MOM) and IBM Message Queue (IBM MQ). It defines key MOM concepts like asynchronous communication, loose coupling, point-to-point and publish-subscribe messaging patterns. It also describes transaction handling, message and queue definitions. Additionally, it outlines IBM MQ objects like queue managers, queues, channels and listeners. Finally, it mentions IBM MQ administration tools for command line and graphical interfaces.
IBM MQ: Managing Workloads, Scaling and Availability with MQ ClustersDavid Ware
MQ Clustering can be used to solve many problems, from simplified administration and workload management in an MQ network, to horizontal scalability and continuous availability of messaging applications. This session will show the full range of uses of MQ Clusters to solve real problems, highlighting the underlying technology being used. A basic understanding of IBM MQ clustering would be beneficial.
Designing IBM MQ deployments for the cloud generationDavid Ware
Businesses are transforming their enterprise IT infrastructure so that application teams can efficiently provision resources in an automated, self-service fashion, to be deployed as a service. In this session, we look at what that means with IBM MQ, and where previous design and deployment practices may not suit a more agile approach. We'll share what's possible with IBM MQ today, including the current best practices to achieve a low-touch, scalable solution whether deploying to the cloud or to on-premise systems.
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...T.Rob Wyatt
This document summarizes the findings from research into security behaviors when using IBM MQ's password authentication (CONNAUTH) feature. It identifies five distinct behaviors exhibited by the interaction between CONNAUTH and CHLAUTH access control rules. The document provides recommendations for mandatory and avoid configurations when using CONNAUTH. It also warns that applying fix packs can cause failures or silently over-authorize users. The summary concludes by thanking two people for their contributions to testing and improving the tools and research presented.
Introduction to ibm cloud paks concept license and minimum config publicPetchpaitoon Krungwong
- IBM Cloud Paks license pricing is based on VPC (Virtual Processor Core) or MVS (Managed Virtual Server) units. The number required depends on the technology, processors, and number of virtual cores/partitions used.
- Sample minimum configurations are provided for IBM Cloud Pak for Applications, Integration, and Multicloud Management. These include the required node types, operating systems, number of VMs, CPU, memory, and storage needed.
- Trade-up licenses allow customers to transition existing software support licenses to IBM Cloud Paks licenses, providing flexibility to use the licenses on-premises or in cloud environments.
IBM MQ Whats new - including 9.3 and 9.3.1Robert Parker
I presented at the IBM MQ French User Group in Paris on the topic of What's new in MQ. I covered both what was new in IBM MQ 9.3 LTS and what was new in the latest IBM MQ 9.3.1 CD release.
IBM MQ 9.3.4 includes several new features and enhancements including:
1) Tuning options for log I/O warnings and improvements in media image scheduling to optimize performance.
2) The MQ Console queue manager overview tab provides a new view of queue manager information.
3) Support for JSON web tokens and smarter media image scheduling with Native HA.
4) Exactly-once processing is enabled for MQ/Kafka connectors and simplified Java/JMS application topologies.
IBM MQ (formerly known as MQSeries) is a middleware messaging product that allows applications on different platforms to communicate asynchronously by sending and receiving messages. It guarantees message delivery and supports advanced features like triggering actions on message receipt. MQ provides a common API for applications to connect to message queues, publish/consume messages, and ensures delivery across heterogeneous systems. It is widely used to integrate legacy mainframe systems with modern platforms.
These charts provide a high-level overview of IIB HA topologies:
• Comparison of active/active and active/passive HA
• Solutions for active/passive HA failover with IBM Integration Bus
• Solutions for active/active processing with IBM Integration Bus
• Adding Global Cache to active/active processing
• Combining all of the above
Only HTTP and JMS (MQ) workloads are shown
App Connect v12. Unit testing with a Pipeline Example. Trevor Dolby Architect...mrle7
App Connect v12 provides connectivity, routing, and transformation capabilities to enable data sharing between applications and services. Unit testing techniques for App Connect include testing individual nodes, external transport links, and capturing existing messages to generate tests. App Connect is well-suited for integration with modern pipelines and container infrastructure. A demo pipeline implements continuous integration and delivery of App Connect applications using Tekton, GitHub actions, and cloud services.
Websphere MQ is IBM's middleware for messaging and queuing that allows applications on distributed systems to communicate. It has a consistent API across platforms and current version is 7.0. Previously known as MQSeries, it was rebranded to Websphere MQ in 2002. Messaging involves program-to-program communication between systems using message queues. MQ defines different queue types for specific purposes that applications can use to exchange messages.
WebSphere MQ is messaging and queuing middleware from IBM that allows applications to communicate asynchronously by sending messages to queues. It provides guaranteed message delivery, decoupling of sending and receiving applications, and publish/subscribe capabilities. Programs using the MQ API can connect to queue managers to put and get messages from queues without having direct connections to each other. Messages have properties and data, and can be persistent or non-persistent. Queues store messages and allow parallel access by multiple applications.
IBM MQ: Using Publish/Subscribe in an MQ NetworkDavid Ware
The publish/subscribe model can be used across a network of MQ queue managers, whether in a manually configured topology or in an MQ cluster. This session looks in-depth at designing such systems, covering a wide range of requirements from availability to scalability, and explaining how they can be addressed. A basic understanding of publish/subscribe in MQ would be beneficial for attendees.
For an introduction to MQ publish/subscribe, first see this presentation: http://www.slideshare.net/DavidWare1/ame-2271-mq-publish-subscribe-pdf
The document provides an overview of the fundamentals of Websphere MQ including:
- The key MQ objects like messages, queues, channels and how they work
- Basic MQ administration tasks like defining, displaying, altering and deleting MQ objects using MQSC commands
- Hands-on exercises are included to demonstrate programming with MQ and administering MQ objects
IBM MQ systems route billions of messages around the world each day. This presentation looks at the tools available in MQ for z/OS to allow you to understand where your messages are flowing, and things you can use if the messages aren't going where you expect.
Building an Active-Active IBM MQ Systemmatthew1001
Shows how message availability and service availability can be configured to reduce downtime and improve overall availability of your MQ network. Demonstrates how Uniform Clusters can be used to help keep your service availability high.
단순한 디지털 트랜스포메이션에서 더 나아가 AI 트랜스포메이션으로 가고 있는 요즘.
AI가 어느새 바로 가까이 다가옴을 느끼는 지금.
선두 Telco 기술에 더하여 AI Company로 나아가는 SKT가 클라우드 기반 AI, Data 사업을 하는 기업 고객들에게 꼭 필요한 기술과 솔루션/서비스를 사례 중심으로 이야기하고자 합니다.
IBM MQ - High Availability and Disaster RecoveryMarkTaylorIBM
IBM MQ provides capabilities to keep data safe and businesses running in the event of failures. This includes solutions for high availability (HA) and disaster recovery (DR) whether running on-premises or in hybrid cloud environments. HA aims to keep systems running through failures while DR focuses on recovering after an HA failure. Key HA technologies in IBM MQ include queue manager clusters, queue sharing groups, multi-instance queue managers, and HA clusters. These solutions provide redundancy to prevent single points of failure and enable fast failover. DR requires replicating data to separate sites which IBM MQ supports through various backup and replication features.
WebSphere MQ CHLAUTH - including V8 changesMorag Hughson
This document discusses IBM MQ CHLAUTH rules and how they were updated in MQ V8. CHLAUTH rules allow you to define which inbound connections are allowed or blocked based on attributes like IP address, hostname, SSL certificate details, client user ID, and remote queue manager name. The document provides examples of CHLAUTH rule configuration and discusses how hostnames are obtained and how rules can be restricted based on IP address/hostname. It also notes that fully qualifying rules with the issuer's DN in addition to the subject's DN is recommended to avoid clashes when multiple CAs are trusted.
This document provides an overview of security features in IBM MQ queue managers. It discusses common security features like connection authentication, authorization, TLS, advanced message security, channel authentication records, security exits, and how the different features interact. The agenda includes deeper sessions on security in MQ queue managers and a security deep dive session. It notes that IBM's statements regarding future products are subject to change and are not a commitment.
CTU 2017 I173 - how to transform your messaging environment to a secure messa...Robert Parker
This document summarizes an IBM Cloud Technical University session on transforming a messaging environment to be secure. The session covered various security features in IBM MQ including connection authentication, authorization, channel authentication using address maps and SSL peer maps, transport layer security (TLS), and security exits. It provided examples of how to configure each feature step-by-step, such as defining authentication information, setting channel authentication rules to blacklist addresses, and setting up a queue manager and channel to use TLS with certificates. The goal was to take an unsecured queue manager and secure it using these IBM MQ security features.
This document provides an overview of message-oriented middleware (MOM) and IBM Message Queue (IBM MQ). It defines key MOM concepts like asynchronous communication, loose coupling, point-to-point and publish-subscribe messaging patterns. It also describes transaction handling, message and queue definitions. Additionally, it outlines IBM MQ objects like queue managers, queues, channels and listeners. Finally, it mentions IBM MQ administration tools for command line and graphical interfaces.
IBM MQ: Managing Workloads, Scaling and Availability with MQ ClustersDavid Ware
MQ Clustering can be used to solve many problems, from simplified administration and workload management in an MQ network, to horizontal scalability and continuous availability of messaging applications. This session will show the full range of uses of MQ Clusters to solve real problems, highlighting the underlying technology being used. A basic understanding of IBM MQ clustering would be beneficial.
Designing IBM MQ deployments for the cloud generationDavid Ware
Businesses are transforming their enterprise IT infrastructure so that application teams can efficiently provision resources in an automated, self-service fashion, to be deployed as a service. In this session, we look at what that means with IBM MQ, and where previous design and deployment practices may not suit a more agile approach. We'll share what's possible with IBM MQ today, including the current best practices to achieve a low-touch, scalable solution whether deploying to the cloud or to on-premise systems.
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...T.Rob Wyatt
This document summarizes the findings from research into security behaviors when using IBM MQ's password authentication (CONNAUTH) feature. It identifies five distinct behaviors exhibited by the interaction between CONNAUTH and CHLAUTH access control rules. The document provides recommendations for mandatory and avoid configurations when using CONNAUTH. It also warns that applying fix packs can cause failures or silently over-authorize users. The summary concludes by thanking two people for their contributions to testing and improving the tools and research presented.
Introduction to ibm cloud paks concept license and minimum config publicPetchpaitoon Krungwong
- IBM Cloud Paks license pricing is based on VPC (Virtual Processor Core) or MVS (Managed Virtual Server) units. The number required depends on the technology, processors, and number of virtual cores/partitions used.
- Sample minimum configurations are provided for IBM Cloud Pak for Applications, Integration, and Multicloud Management. These include the required node types, operating systems, number of VMs, CPU, memory, and storage needed.
- Trade-up licenses allow customers to transition existing software support licenses to IBM Cloud Paks licenses, providing flexibility to use the licenses on-premises or in cloud environments.
IBM MQ Whats new - including 9.3 and 9.3.1Robert Parker
I presented at the IBM MQ French User Group in Paris on the topic of What's new in MQ. I covered both what was new in IBM MQ 9.3 LTS and what was new in the latest IBM MQ 9.3.1 CD release.
IBM MQ 9.3.4 includes several new features and enhancements including:
1) Tuning options for log I/O warnings and improvements in media image scheduling to optimize performance.
2) The MQ Console queue manager overview tab provides a new view of queue manager information.
3) Support for JSON web tokens and smarter media image scheduling with Native HA.
4) Exactly-once processing is enabled for MQ/Kafka connectors and simplified Java/JMS application topologies.
IBM MQ (formerly known as MQSeries) is a middleware messaging product that allows applications on different platforms to communicate asynchronously by sending and receiving messages. It guarantees message delivery and supports advanced features like triggering actions on message receipt. MQ provides a common API for applications to connect to message queues, publish/consume messages, and ensures delivery across heterogeneous systems. It is widely used to integrate legacy mainframe systems with modern platforms.
These charts provide a high-level overview of IIB HA topologies:
• Comparison of active/active and active/passive HA
• Solutions for active/passive HA failover with IBM Integration Bus
• Solutions for active/active processing with IBM Integration Bus
• Adding Global Cache to active/active processing
• Combining all of the above
Only HTTP and JMS (MQ) workloads are shown
App Connect v12. Unit testing with a Pipeline Example. Trevor Dolby Architect...mrle7
App Connect v12 provides connectivity, routing, and transformation capabilities to enable data sharing between applications and services. Unit testing techniques for App Connect include testing individual nodes, external transport links, and capturing existing messages to generate tests. App Connect is well-suited for integration with modern pipelines and container infrastructure. A demo pipeline implements continuous integration and delivery of App Connect applications using Tekton, GitHub actions, and cloud services.
Websphere MQ is IBM's middleware for messaging and queuing that allows applications on distributed systems to communicate. It has a consistent API across platforms and current version is 7.0. Previously known as MQSeries, it was rebranded to Websphere MQ in 2002. Messaging involves program-to-program communication between systems using message queues. MQ defines different queue types for specific purposes that applications can use to exchange messages.
WebSphere MQ is messaging and queuing middleware from IBM that allows applications to communicate asynchronously by sending messages to queues. It provides guaranteed message delivery, decoupling of sending and receiving applications, and publish/subscribe capabilities. Programs using the MQ API can connect to queue managers to put and get messages from queues without having direct connections to each other. Messages have properties and data, and can be persistent or non-persistent. Queues store messages and allow parallel access by multiple applications.
IBM MQ: Using Publish/Subscribe in an MQ NetworkDavid Ware
The publish/subscribe model can be used across a network of MQ queue managers, whether in a manually configured topology or in an MQ cluster. This session looks in-depth at designing such systems, covering a wide range of requirements from availability to scalability, and explaining how they can be addressed. A basic understanding of publish/subscribe in MQ would be beneficial for attendees.
For an introduction to MQ publish/subscribe, first see this presentation: http://www.slideshare.net/DavidWare1/ame-2271-mq-publish-subscribe-pdf
The document provides an overview of the fundamentals of Websphere MQ including:
- The key MQ objects like messages, queues, channels and how they work
- Basic MQ administration tasks like defining, displaying, altering and deleting MQ objects using MQSC commands
- Hands-on exercises are included to demonstrate programming with MQ and administering MQ objects
IBM MQ systems route billions of messages around the world each day. This presentation looks at the tools available in MQ for z/OS to allow you to understand where your messages are flowing, and things you can use if the messages aren't going where you expect.
Building an Active-Active IBM MQ Systemmatthew1001
Shows how message availability and service availability can be configured to reduce downtime and improve overall availability of your MQ network. Demonstrates how Uniform Clusters can be used to help keep your service availability high.
단순한 디지털 트랜스포메이션에서 더 나아가 AI 트랜스포메이션으로 가고 있는 요즘.
AI가 어느새 바로 가까이 다가옴을 느끼는 지금.
선두 Telco 기술에 더하여 AI Company로 나아가는 SKT가 클라우드 기반 AI, Data 사업을 하는 기업 고객들에게 꼭 필요한 기술과 솔루션/서비스를 사례 중심으로 이야기하고자 합니다.
IBM MQ - High Availability and Disaster RecoveryMarkTaylorIBM
IBM MQ provides capabilities to keep data safe and businesses running in the event of failures. This includes solutions for high availability (HA) and disaster recovery (DR) whether running on-premises or in hybrid cloud environments. HA aims to keep systems running through failures while DR focuses on recovering after an HA failure. Key HA technologies in IBM MQ include queue manager clusters, queue sharing groups, multi-instance queue managers, and HA clusters. These solutions provide redundancy to prevent single points of failure and enable fast failover. DR requires replicating data to separate sites which IBM MQ supports through various backup and replication features.
WebSphere MQ CHLAUTH - including V8 changesMorag Hughson
This document discusses IBM MQ CHLAUTH rules and how they were updated in MQ V8. CHLAUTH rules allow you to define which inbound connections are allowed or blocked based on attributes like IP address, hostname, SSL certificate details, client user ID, and remote queue manager name. The document provides examples of CHLAUTH rule configuration and discusses how hostnames are obtained and how rules can be restricted based on IP address/hostname. It also notes that fully qualifying rules with the issuer's DN in addition to the subject's DN is recommended to avoid clashes when multiple CAs are trusted.
This document provides an overview of security features in IBM MQ queue managers. It discusses common security features like connection authentication, authorization, TLS, advanced message security, channel authentication records, security exits, and how the different features interact. The agenda includes deeper sessions on security in MQ queue managers and a security deep dive session. It notes that IBM's statements regarding future products are subject to change and are not a commitment.
CTU 2017 I173 - how to transform your messaging environment to a secure messa...Robert Parker
This document summarizes an IBM Cloud Technical University session on transforming a messaging environment to be secure. The session covered various security features in IBM MQ including connection authentication, authorization, channel authentication using address maps and SSL peer maps, transport layer security (TLS), and security exits. It provided examples of how to configure each feature step-by-step, such as defining authentication information, setting channel authentication rules to blacklist addresses, and setting up a queue manager and channel to use TLS with certificates. The goal was to take an unsecured queue manager and secure it using these IBM MQ security features.
This document discusses advanced message security (AMS) in IBM MQ. AMS provides message-level security by encrypting and signing messages to protect them in transit and at rest. It uses TLS features for protection. There are three policy options: integrity signs messages, privacy signs and encrypts, and confidentiality only encrypts (MQ v9+). AMS increases performance overhead from cryptographic operations and increases message size. It does not control access, only protects message contents.
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...Robert Parker
Presentation delivered at Interconnect 2017. Session ID 6893: Keep out the bad guys by securing your MQ messaging environment.
With today's focus on security, ensuring you utilize all of the options available to maximize your systems security is a high priority for many businesses. In this session, we will work through a step-by-step case study that details how you can enhance the security of your Queue Managers using the different features available in IBM MQ.
Simplifying IBM MQ Security in your MQ estateRobert Parker
Presented at the IBM Community webinar. Watch the recording here: https://ibm.webcasts.com/starthere.jsp?ei=1640754&tp_key=ae9f8ed0d4
This presentation focused on how to tackle IBM MQ Security, breaking it into smaller features in order to implement it in smaller chunks for easier to understand implementations.
MQTC 2016 - IBM MQ Security: Overview & recapRobert Parker
Security features are important in any modern day application and MQ is no exception. In order to
ensure user data is protected to the user's requirements applications must supply a variety of
configurable security features. In this session we will be providing an introduction to all of IBM MQ's
security features and a high level overview of why you would use them.
These slides from my talk at the buildingIoT conference discuss how to secure communication with the Internet of Things protocol "MQTT". It discusses Network, Host, Application and Data Security and also covers advanced topics like OAuth 2.0 and X509 client certificate authentication.
The Future of PKI. Using automation tools and protocols to bootstrap trust in...DATA SECURITY SOLUTIONS
This document discusses using automation tools and protocols to establish trust in a dynamic cloud environment. It proposes using a public key infrastructure (PKI) with automated certificate lifecycle management to enable end-to-end encryption. The Automated Certificate Management Environment (ACME) protocol is highlighted as a way to automate interactions between clients and certificate authorities for certificate issuance and renewal without manual steps. The architecture described uses open source tools like Boulder and Certbot to implement the ACME protocol and automate certificate distribution and management at scale.
Trust and Cloud computing, removing the need for the consumer to trust their ...David Wallom
Trusted computing and remote attestation techniques can be used to build trust in cloud computing by creating a "chain of trust" from the hardware to cloud services and data. This allows users to verify that only authorized applications and services are accessing data and resources as intended, without needing to unconditionally trust the cloud provider. The solution involves using trusted computing mechanisms like TPMs to attest different components in the cloud infrastructure and ensure only expected software configurations are present. It also proposes using a distributed open attestation service to periodically examine cloud nodes and verify their configurations remain intact, helping address issues of resilience and scalability for attestation.
Trust and Cloud computing, removing the need for the consumer to trust their ...David Wallom
Trusted computing and remote attestation techniques can be used to build trust in cloud computing by creating a "chain of trust" from the hardware to the cloud services and user data. This allows a user to verify the configuration of each component in the cloud and ensure only authorized applications and services can access sensitive data. The solution involves using trusted computing mechanisms like TPM chips to attest cloud hosts, VMs, and services. It also allows application and data whitelisting based on these remote attestations to build trust without requiring users to unconditionally trust their cloud provider.
Trust and Cloud Computing, removing the need to trust your cloud providerDavid Wallom
Presentation at CloudSecurityExpo 2106 publicly describing the Porridge distributed remote attestation using multiple trusted Third Parties as a way of building a cryptographically secure cloud service. Allowing users to know the cloud they are using is in exactly the format they expect. This will be commercially available through the Antyran product. This work is supported by InnovateUK KTP in partnership between University of Oxford e-Research centre and 100PercentIT. Other partners not in the KTP in include OctaInnovations.
This document discusses identity management and security in cloud computing. It covers key topics such as:
- Centralized identity management provides benefits like a single user identity, consistent security policies, and reduced costs.
- Authentication establishes a user's identity through credentials. Popular methods include JSON web tokens (JWTs) which use digital signatures to authenticate API requests without authenticating each one individually.
- JWTs work by having a client authenticate once to get a token, then include that token in subsequent requests to prove identity without further authentication. The token contains identity claims and is digitally signed by an authentication authority.
InterConnect 2016: IBM MQ self-service and as-a-serviceDavid Ware
Businesses are transforming their enterprise IT infrastructure so that application teams can provision resources in an automated, self-service or "as-a-Service" fashion, often from a self-service portal or as part of an on-premise Platform-as-a-Service (PaaS). In this session, we explain the tools and techniques that are available to integrate MQ into such an environment. This changes an MQ deployment from a high-touch activity with significant interaction between humans on the application and middleware teams to an automated, efficient process.
Fireware v11.10 includes the following new features and enhancements:
- Bandwidth and time user quotas allow enforcing daily limits on user internet usage.
- Monitoring tools now allow reviewing and resetting user quota data.
- VPN diagnostic messages provide more information to troubleshoot VPN issues.
- Wireless access point features include traffic shaping, time-based SSID activation, and rogue access point detection.
Blockchain technology application in drones and cybersecurityNile University
The presentation describes the Blockchain main concepts, structure, and advantages with application in Drones to empower the cybersecurity problems and gave a sample of application is Inventory and supply chain management
- Hyperledger Fabric now supports Ethereum smart contracts through integration with the Ethereum Virtual Machine (EVM). This will allow Ethereum developers to work with Hyperledger Fabric and migrate smart contracts and decentralized apps between the platforms.
- Hyperledger is an open source blockchain project hosted by the Linux Foundation. It includes various blockchain frameworks and tools including Fabric, Sawtooth, and Composer. Fabric is the most widely adopted Hyperledger blockchain framework.
- Hyperledger blockchain applications interact with peers to access and update the shared ledger. The ledger contains a growing list of immutable transaction records organized into blocks.
This document discusses human and technological aspects of cyber threats facing universities. It notes that while increased data and connectivity enable opportunities, they also present cybersecurity risks that could threaten an organization's existence. The challenges for IT security leaders are to balance security awareness with business needs. Recent attacks have shown blending of new and old techniques, resulting in highly evasive threats. The document also describes the four key steps in security authentication: identification, authentication, authorization, and accountability. It stresses integrating these steps is vital for securing networks against various attacks.
The document provides information about new features in IBM MQ versions 9.3.1 through 9.3.4. It discusses enhancements to security, availability, administration, and monitoring in these versions. Key updates include TLS 1.3 support, Native HA for improved resilience, simplified administration through centralized management and REST APIs, and enhanced observability using streaming queues and log analytics.
M08 protecting your message data in IBM MQ with encryptionRobert Parker
This presentation was originally presented at IBM TechCon 2020. In it we go through the various options in IBM MQ to protect both connections and message data using encryption focussing on the TLS and AMS features.
M10: How to implement mq in a containerized architecture ITC 2019Robert Parker
The document discusses implementing IBM MQ in a containerized architecture. It provides an agenda that covers containers introductions, MQ in containers, use cases, and considerations for implementing MQ in containers. Specifically, it discusses how MQ is supported in containers from version 8.0.0.4 onwards. It recommends using the MQ V9 continuous delivery release. It also outlines different container platforms that support MQ and provides a table comparing the support.
Presented at MQ Technical Conference 2018
More businesses are discovering the benefit of the cloud and moving parts or the whole of their infrastructure onto cloud platforms. In this session we will be looking at how you can utilize IBM MQ in the cloud including considerations you must make before moving your MQ infrastructure into the cloud. We will also look at what resources are available for you to use as a starting point for moving IBM MQ in the cloud.
Presented at MQ Technical Conference 2018
Several businesses are now moving to implement new or existing infrastructures in containers rather than traditional on-prem or virtual machine environments. In this session we will talk about the benefits of containers and show how IBM MQ can be ran in a container. Providing an example and sample of how you can get started running IBM MQ in a container.
IBM MQ can run in containers to provide benefits like faster deployment, version management and high availability. MQ supports running in Docker containers on common container services and orchestration platforms. Sample container images are available on Docker Hub and IBM Cloud to simplify deployment of MQ in containers. The MQ team has also developed an IBM MQ SaaS offering on IBM Cloud that allows provisioning of MQ queue managers without managing infrastructure.
This presentation was delivered at the MQTC 2017 conference in Ohio. It covers different concepts and features of MQ you need to consider when moving your IBM MQ infrastructure into the cloud.
IBM MQ security deep dive including AMS MQTC 2017Robert Parker
This document provides an overview of IBM MQ security features including Advanced Message Security (AMS), channel authentication, connection authentication, and how they interact. It discusses how AMS protects messages at rest and in transit, the different protection levels, and considerations around performance and message size. It also covers how channel authentication rules filter incoming connections, the different types of filters, and how connection authentication levels impact authentication. Finally, it discusses how the "EarlyAdopt" parameter allows channel authentication mapping rules to override the user from a successful connection authentication.
Deploying and managing IBM MQ in the CloudRobert Parker
When moving to the cloud you want to ensure that the deployment and management of your cloud queue managers is as easy and streamlined as possible. In this session we will look at a few tools you can use to deploy and manage your queue managers, as well as where you can find examples of these tools in action.
This presentation was given at the WebSphere User Group in Hursley, June 2017.
Interconnect 2017: 6885 Deploying IBM MQ in the cloudRobert Parker
Presentation delivered at Interconnect 2017 Session ID 6885.
Most businesses are either already using cloud technologies, or are planning to do so in the near future. Whether it's moving to a public or private cloud environment, or simply adopting cloud-like practices in deploying and managing your on-premise systems, many of you are doing this with IBM MQ. There are an almost endless number of cloud technologies available: IBM Bluemix, Microsoft Azure, Amazon Web Services, OpenStack, Docker, Kubernetes, Chef, Google Cloud Platform... This session will give an overview of many of these technologies and platforms, and describe how IBM MQ should be deployed, configured and managed when using them.
These slides were presented at the Cloud Technical University 2017 in Madrid.
Businesses are transforming their enterprise IT infrastructure to run in the Cloud. This doesn't have to be a simple lift and shift, it
promotes selfservice practices and new automated deployment and management techniques. This session will explain the many
possibilities and techniques that are available to run MQ in such environments, whether you're looking to move to a public or private
cloud, such as Bluemix, Azure, AWS, OpenStack or Docker environments.
MQTC 2016: Monitoring and Tracking MQ and ApplicationsRobert Parker
This document discusses various ways to monitor IBM MQ messaging systems. It describes how to use online status commands to check the status of queue managers, queues, channels, topics, and applications. It also discusses monitoring through event messages, which provide auditing information about security failures, commands issued, and configuration changes. The document provides examples of using MQSC commands and the MQ Explorer GUI to view status information and analyze event message structures and parameters.
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
These slides were presented at Interconnect with Leif Davidsen presenting why securing your environment is important and then i presented what security features in IBM MQ can be used to protect your environment.
F-Secure Freedome VPN 2025 Crack Plus Activation New Versionsaimabibi60507
Copy & Past Link 👉👉
https://dr-up-community.info/
F-Secure Freedome VPN is a virtual private network service developed by F-Secure, a Finnish cybersecurity company. It offers features such as Wi-Fi protection, IP address masking, browsing protection, and a kill switch to enhance online privacy and security .
Interactive Odoo Dashboard for various business needs can provide users with dynamic, visually appealing dashboards tailored to their specific requirements. such a module that could support multiple dashboards for different aspects of a business
✅Visit And Buy Now : https://bit.ly/3VojWza
✅This Interactive Odoo dashboard module allow user to create their own odoo interactive dashboards for various purpose.
App download now :
Odoo 18 : https://bit.ly/3VojWza
Odoo 17 : https://bit.ly/4h9Z47G
Odoo 16 : https://bit.ly/3FJTEA4
Odoo 15 : https://bit.ly/3W7tsEB
Odoo 14 : https://bit.ly/3BqZDHg
Odoo 13 : https://bit.ly/3uNMF2t
Try Our website appointment booking odoo app : https://bit.ly/3SvNvgU
👉Want a Demo ?📧 [email protected]
➡️Contact us for Odoo ERP Set up : 091066 49361
👉Explore more apps: https://bit.ly/3oFIOCF
👉Want to know more : 🌐 https://www.axistechnolabs.com/
#odoo #odoo18 #odoo17 #odoo16 #odoo15 #odooapps #dashboards #dashboardsoftware #odooerp #odooimplementation #odoodashboardapp #bestodoodashboard #dashboardapp #odoodashboard #dashboardmodule #interactivedashboard #bestdashboard #dashboard #odootag #odooservices #odoonewfeatures #newappfeatures #odoodashboardapp #dynamicdashboard #odooapp #odooappstore #TopOdooApps #odooapp #odooexperience #odoodevelopment #businessdashboard #allinonedashboard #odooproducts
Adobe Master Collection CC Crack Advance Version 2025kashifyounis067
🌍📱👉COPY LINK & PASTE ON GOOGLE http://drfiles.net/ 👈🌍
Adobe Master Collection CC (Creative Cloud) is a comprehensive subscription-based package that bundles virtually all of Adobe's creative software applications. It provides access to a wide range of tools for graphic design, video editing, web development, photography, and more. Essentially, it's a one-stop-shop for creatives needing a broad set of professional tools.
Key Features and Benefits:
All-in-one access:
The Master Collection includes apps like Photoshop, Illustrator, InDesign, Premiere Pro, After Effects, Audition, and many others.
Subscription-based:
You pay a recurring fee for access to the latest versions of all the software, including new features and updates.
Comprehensive suite:
It offers tools for a wide variety of creative tasks, from photo editing and illustration to video editing and web development.
Cloud integration:
Creative Cloud provides cloud storage, asset sharing, and collaboration features.
Comparison to CS6:
While Adobe Creative Suite 6 (CS6) was a one-time purchase version of the software, Adobe Creative Cloud (CC) is a subscription service. CC offers access to the latest versions, regular updates, and cloud integration, while CS6 is no longer updated.
Examples of included software:
Adobe Photoshop: For image editing and manipulation.
Adobe Illustrator: For vector graphics and illustration.
Adobe InDesign: For page layout and desktop publishing.
Adobe Premiere Pro: For video editing and post-production.
Adobe After Effects: For visual effects and motion graphics.
Adobe Audition: For audio editing and mixing.
FL Studio Producer Edition Crack 2025 Full Versiontahirabibi60507
Copy & Past Link 👉👉
http://drfiles.net/
FL Studio is a Digital Audio Workstation (DAW) software used for music production. It's developed by the Belgian company Image-Line. FL Studio allows users to create and edit music using a graphical user interface with a pattern-based music sequencer.
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)Andre Hora
Exceptions allow developers to handle error cases expected to occur infrequently. Ideally, good test suites should test both normal and exceptional behaviors to catch more bugs and avoid regressions. While current research analyzes exceptions that propagate to tests, it does not explore other exceptions that do not reach the tests. In this paper, we provide an empirical study to explore how frequently exceptional behaviors are tested in real-world systems. We consider both exceptions that propagate to tests and the ones that do not reach the tests. For this purpose, we run an instrumented version of test suites, monitor their execution, and collect information about the exceptions raised at runtime. We analyze the test suites of 25 Python systems, covering 5,372 executed methods, 17.9M calls, and 1.4M raised exceptions. We find that 21.4% of the executed methods do raise exceptions at runtime. In methods that raise exceptions, on the median, 1 in 10 calls exercise exceptional behaviors. Close to 80% of the methods that raise exceptions do so infrequently, but about 20% raise exceptions more frequently. Finally, we provide implications for researchers and practitioners. We suggest developing novel tools to support exercising exceptional behaviors and refactoring expensive try/except blocks. We also call attention to the fact that exception-raising behaviors are not necessarily “abnormal” or rare.
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AIdanshalev
If we were building a GenAI stack today, we'd start with one question: Can your retrieval system handle multi-hop logic?
Trick question, b/c most can’t. They treat retrieval as nearest-neighbor search.
Today, we discussed scaling #GraphRAG at AWS DevOps Day, and the takeaway is clear: VectorRAG is naive, lacks domain awareness, and can’t handle full dataset retrieval.
GraphRAG builds a knowledge graph from source documents, allowing for a deeper understanding of the data + higher accuracy.
Societal challenges of AI: biases, multilinguism and sustainabilityJordi Cabot
Towards a fairer, inclusive and sustainable AI that works for everybody.
Reviewing the state of the art on these challenges and what we're doing at LIST to test current LLMs and help you select the one that works best for you
Why Orangescrum Is a Game Changer for Construction Companies in 2025Orangescrum
Orangescrum revolutionizes construction project management in 2025 with real-time collaboration, resource planning, task tracking, and workflow automation, boosting efficiency, transparency, and on-time project delivery.
Meet the Agents: How AI Is Learning to Think, Plan, and CollaborateMaxim Salnikov
Imagine if apps could think, plan, and team up like humans. Welcome to the world of AI agents and agentic user interfaces (UI)! In this session, we'll explore how AI agents make decisions, collaborate with each other, and create more natural and powerful experiences for users.
Adobe After Effects Crack FREE FRESH version 2025kashifyounis067
🌍📱👉COPY LINK & PASTE ON GOOGLE http://drfiles.net/ 👈🌍
Adobe After Effects is a software application used for creating motion graphics, special effects, and video compositing. It's widely used in TV and film post-production, as well as for creating visuals for online content, presentations, and more. While it can be used to create basic animations and designs, its primary strength lies in adding visual effects and motion to videos and graphics after they have been edited.
Here's a more detailed breakdown:
Motion Graphics:
.
After Effects is powerful for creating animated titles, transitions, and other visual elements to enhance the look of videos and presentations.
Visual Effects:
.
It's used extensively in film and television for creating special effects like green screen compositing, object manipulation, and other visual enhancements.
Video Compositing:
.
After Effects allows users to combine multiple video clips, images, and graphics to create a final, cohesive visual.
Animation:
.
It uses keyframes to create smooth, animated sequences, allowing for precise control over the movement and appearance of objects.
Integration with Adobe Creative Cloud:
.
After Effects is part of the Adobe Creative Cloud, a suite of software that includes other popular applications like Photoshop and Premiere Pro.
Post-Production Tool:
.
After Effects is primarily used in the post-production phase, meaning it's used to enhance the visuals after the initial editing of footage has been completed.
How can one start with crypto wallet development.pptxlaravinson24
This presentation is a beginner-friendly guide to developing a crypto wallet from scratch. It covers essential concepts such as wallet types, blockchain integration, key management, and security best practices. Ideal for developers and tech enthusiasts looking to enter the world of Web3 and decentralized finance.
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?steaveroggers
Migrating from Lotus Notes to Outlook can be a complex and time-consuming task, especially when dealing with large volumes of NSF emails. This presentation provides a complete guide on how to batch export Lotus Notes NSF emails to Outlook PST format quickly and securely. It highlights the challenges of manual methods, the benefits of using an automated tool, and introduces eSoftTools NSF to PST Converter Software — a reliable solution designed to handle bulk email migrations efficiently. Learn about the software’s key features, step-by-step export process, system requirements, and how it ensures 100% data accuracy and folder structure preservation during migration. Make your email transition smoother, safer, and faster with the right approach.
Read More:- https://www.esofttools.com/nsf-to-pst-converter.html
Who Watches the Watchmen (SciFiDevCon 2025)Allon Mureinik
Tests, especially unit tests, are the developers’ superheroes. They allow us to mess around with our code and keep us safe.
We often trust them with the safety of our codebase, but how do we know that we should? How do we know that this trust is well-deserved?
Enter mutation testing – by intentionally injecting harmful mutations into our code and seeing if they are caught by the tests, we can evaluate the quality of the safety net they provide. By watching the watchmen, we can make sure our tests really protect us, and we aren’t just green-washing our IDEs to a false sense of security.
Talk from SciFiDevCon 2025
https://www.scifidevcon.com/courses/2025-scifidevcon/contents/680efa43ae4f5
🌍📱👉COPY LINK & PASTE ON GOOGLE http://drfiles.net/ 👈🌍
Adobe Illustrator is a powerful, professional-grade vector graphics software used for creating a wide range of designs, including logos, icons, illustrations, and more. Unlike raster graphics (like photos), which are made of pixels, vector graphics in Illustrator are defined by mathematical equations, allowing them to be scaled up or down infinitely without losing quality.
Here's a more detailed explanation:
Key Features and Capabilities:
Vector-Based Design:
Illustrator's foundation is its use of vector graphics, meaning designs are created using paths, lines, shapes, and curves defined mathematically.
Scalability:
This vector-based approach allows for designs to be resized without any loss of resolution or quality, making it suitable for various print and digital applications.
Design Creation:
Illustrator is used for a wide variety of design purposes, including:
Logos and Brand Identity: Creating logos, icons, and other brand assets.
Illustrations: Designing detailed illustrations for books, magazines, web pages, and more.
Marketing Materials: Creating posters, flyers, banners, and other marketing visuals.
Web Design: Designing web graphics, including icons, buttons, and layouts.
Text Handling:
Illustrator offers sophisticated typography tools for manipulating and designing text within your graphics.
Brushes and Effects:
It provides a range of brushes and effects for adding artistic touches and visual styles to your designs.
Integration with Other Adobe Software:
Illustrator integrates seamlessly with other Adobe Creative Cloud apps like Photoshop, InDesign, and Dreamweaver, facilitating a smooth workflow.
Why Use Illustrator?
Professional-Grade Features:
Illustrator offers a comprehensive set of tools and features for professional design work.
Versatility:
It can be used for a wide range of design tasks and applications, making it a versatile tool for designers.
Industry Standard:
Illustrator is a widely used and recognized software in the graphic design industry.
Creative Freedom:
It empowers designers to create detailed, high-quality graphics with a high degree of control and precision.
Explaining GitHub Actions Failures with Large Language Models Challenges, In...ssuserb14185
GitHub Actions (GA) has become the de facto tool that developers use to automate software workflows, seamlessly building, testing, and deploying code. Yet when GA fails, it disrupts development, causing delays and driving up costs. Diagnosing failures becomes especially challenging because error logs are often long, complex and unstructured. Given these difficulties, this study explores the potential of large language models (LLMs) to generate correct, clear, concise, and actionable contextual descriptions (or summaries) for GA failures, focusing on developers’ perceptions of their feasibility and usefulness. Our results show that over 80% of developers rated LLM explanations positively in terms of correctness for simpler/small logs. Overall, our findings suggest that LLMs can feasibly assist developers in understanding common GA errors, thus, potentially reducing manual analysis. However, we also found that improved reasoning abilities are needed to support more complex CI/CD scenarios. For instance, less experienced developers tend to be more positive on the described context, while seasoned developers prefer concise summaries. Overall, our work offers key insights for researchers enhancing LLM reasoning, particularly in adapting explanations to user expertise.
https://arxiv.org/abs/2501.16495
Download YouTube By Click 2025 Free Full Activatedsaniamalik72555
Copy & Past Link 👉👉
https://dr-up-community.info/
"YouTube by Click" likely refers to the ByClick Downloader software, a video downloading and conversion tool, specifically designed to download content from YouTube and other video platforms. It allows users to download YouTube videos for offline viewing and to convert them to different formats.
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Eric D. Schabell
It's time you stopped letting your telemetry data pressure your budgets and get in the way of solving issues with agility! No more I say! Take back control of your telemetry data as we guide you through the open source project Fluent Bit. Learn how to manage your telemetry data from source to destination using the pipeline phases covering collection, parsing, aggregation, transformation, and forwarding from any source to any destination. Buckle up for a fun ride as you learn by exploring how telemetry pipelines work, how to set up your first pipeline, and exploring several common use cases that Fluent Bit helps solve. All this backed by a self-paced, hands-on workshop that attendees can pursue at home after this session (https://o11y-workshops.gitlab.io/workshop-fluentbit).
Avast Premium Security Crack FREE Latest Version 2025mu394968
🌍📱👉COPY LINK & PASTE ON GOOGLE https://dr-kain-geera.info/👈🌍
Avast Premium Security is a paid subscription service that provides comprehensive online security and privacy protection for multiple devices. It includes features like antivirus, firewall, ransomware protection, and website scanning, all designed to safeguard against a wide range of online threats, according to Avast.
Key features of Avast Premium Security:
Antivirus: Protects against viruses, malware, and other malicious software, according to Avast.
Firewall: Controls network traffic and blocks unauthorized access to your devices, as noted by All About Cookies.
Ransomware protection: Helps prevent ransomware attacks, which can encrypt your files and hold them hostage.
Website scanning: Checks websites for malicious content before you visit them, according to Avast.
Email Guardian: Scans your emails for suspicious attachments and phishing attempts.
Multi-device protection: Covers up to 10 devices, including Windows, Mac, Android, and iOS, as stated by 2GO Software.
Privacy features: Helps protect your personal data and online privacy.
In essence, Avast Premium Security provides a robust suite of tools to keep your devices and online activity safe and secure, according to Avast.
2. TechCon 2022 2
Virtual Experience
Please note:
IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion.
Information regarding potential future products is intended to outline our general product direction and it should not be relied on in
making a purchasing decision.
The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver
any material, code or functionality. Information about potential future products may not be incorporated into any contract.
The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.
Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual
throughput or performance that any user will experience will vary depending upon many factors, including considerations such as
the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed.
Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
5. 5
TechCon 2022 Virtual Experience
Identities in MQ
• Identity provides a mechanism for authorization
• We can provide authority to an identity so allow/restrict them from performing actions
• When an application or queue manager connects it can provide different types of identities.
6. 6
TechCon 2022 Virtual Experience
Application identities in MQ
OS User Supplied
User
Certificate
IP/
Hostname
• User the
application
runs as
• User supplied
via MQCSP
structure
• Includes
password
• IBM MQ v8+
• IP/Hostname of
connecting
application
• TLS Certificate
remote
application
provides
7. 7
TechCon 2022 Virtual Experience
Queue Manager identities in MQ
Queue Manager
Name
Certificate
IP/
Hostname
• Remote queue
manager’s
name
• IP/Hostname of
connecting
queue
manager
• TLS Certificate
remote queue
manager
provides
8. 8
TechCon 2022 Virtual Experience
Different identities in MQ
• To authorize, MQ uses user based identification
• Identities outside of this need to convert to user
• MQ provides options for this.
9. 9
TechCon 2022 Virtual Experience
MQ Authorization
• Controlled by creating authority records
• Specific user or group.
• Generic MQ object
• Authority is for MQ objects and what actions they can perform
• (PUT, GET, OPEN, etc)
• If a user or group does not have authority to do what they are trying to do,
they get blocked.
• Authority is built up from all authority record sources.
• Users who are members of the mqm group have full administrator access.
11. 11
TechCon 2022 Virtual Experience
Authentication
• Blindly trusting the identity a connection provides is bad.
• Are they really an administrator?
• Should they be able to put messages there?
• Authentication provides a mechanism to check the identity is who they claim
to be.
• MQ provides numerous options
12. 12
TechCon 2022 Virtual Experience
Authentication
• While there are numerous options…
• MQ has different options whether it is a application or queue manager
14. 14
TechCon 2022 Virtual Experience
TLS
• MQ channels can be configured to require connecting clients to supply a
trusted certificate
• Trust of a client’s certificate follows TLS standards
Cert
CA
15. 15
TechCon 2022 Virtual Experience
Security exits
• Security exits are bespoke, customer created exits that are ran during the
security checking.
• MQ comes with an API that can interact with MQ to provide extra control over
a connection.
• They allow customers to expand MQ's security to suit their needs.
• When ran the security exit will have access to the channel definition and
information about the incoming connection.
• It will also have a piece of data passed to it that is set on the channel – SCYDATA
• Channel exits can be created in pairs that exchange ‘messages’
16. 16
TechCon 2022 Virtual Experience
Channel authentication rules
• Channel authentication rules are filters that can be applied for incoming
connections
• Allowlisting – Allow connections based on a filter
• Mapping rules – Allow connections based on a filter and modify it’s identity
• Blocklisting – Block a connection based on a filter
• There are four types of filters:
• TLS Distinguished name (Issuer and Subject)
• Client User ID name
• Remote Queue Manager name
• IP/Hostname
London
New York
Block:
London
Allow:
New York
18. 18
TechCon 2022 Virtual Experience
Connection Authentication
• Connection authentication feature
• Allows authentication using user credentials supplied by client applications
• Credentials can be validated against a number of user repositories
• OS
• LDAP
• PAM modules
• Security exits
LDAP
Userid
Password
20. 20
TechCon 2022 Virtual Experience
Granular controls
• You may wish to have different levels of checks for different connections
• You may trust the internal but need further reassurance for external
21. 21
TechCon 2022 Virtual Experience
Granular controls
• Of course you may choose to trust no-one
22. 22
TechCon 2022 Virtual Experience
Granular controls
• Each Security option can be configured for all, some or no channels
• Security Exits
• Applied on a per-channel basis.
• TLS
• Mutual TLS enforced on per channel basis – SSLCAUTH(OPTIONAL|REQUIRED)
• Can limit allowed certificates via SSLPEER or SSLPEERMAP
• Channel Authentication Rules
• Configured to apply to a specific or set of channels
23. 23
TechCon 2022 Virtual Experience
Granular Controls
• Connection authentication is the same
• CHCKCLNT field allows you to specify whether to enforce userid/pw or not
• This can also be changed via channel authentication rules
CHCKCLNT(optional)
CHCKCLNT(required)
25. 25
TechCon 2022 Virtual Experience
Different identities in MQ
• To authorize, MQ uses user based identification
• Identities outside of this need to convert to user
• MQ provides options for this.
Earlier!
27. 27
TechCon 2022 Virtual Experience
Modifying identities
• Using the granular controls you can authenticate with one mechanism but
then switch to authorize via a different identity
Modify identity to app2
Modify identity to app1
Cert
Userid
Passwor
d
28. 28
TechCon 2022 Virtual Experience
Which identity will be used?
Method Notes
Client machine user ID flowed to server This will be over-ridden by anything else. Rarely do you want to trust an
unauthenticated client side user ID.
MCAUSER set on SVRCONN channel
definition
A handy trick to ensure that the client flowed ID is never used is to define
the MCAUSER as ‘rubbish’ and then anything that is not set
appropriately by one of the next methods cannot connect.
MCAUSER set by ADOPTCTX(YES) The queue manager wide setting to adopt the password authenticated
user ID as the MCAUSER will over-ride either of the above.
MCAUSER set by CHLAUTH rule To allow more granular control of MCAUSER setting, rather than relying
on the above queue manager wide setting, you can of course use
CHLAUTH rules
MCAUSER set by Security Exit Although CHLAUTH gets the final say on whether a connection is
blocked (security exit not called in that case), the security exit does get
called with the MCAUSER CHLAUTH has decided upon, and can
change it.
Highest
Lowest
29. 29
TechCon 2022 Virtual Experience
Which identity will be used? – Queue Manager
Method Notes
UserId that started the channel process Commonly MQM
MCAUSER set on SVRCONN channel
definition
A handy trick to ensure that the client flowed ID is never used is to define
the MCAUSER as ‘rubbish’ and then anything that is not set
appropriately by one of the next methods cannot connect.
MCAUSER set by CHLAUTH rule To allow more granular control of MCAUSER setting, rather than relying
on the above queue manager wide setting, you can of course use
CHLAUTH rules
MCAUSER set by Security Exit Although CHLAUTH gets the final say on whether a connection is
blocked (security exit not called in that case), the security exit does get
called with the MCAUSER CHLAUTH has decided upon, and can
change it.
Highest
Lowest
• The queue manager differs slightly…
• It is important to change the default identity
30. 30
TechCon 2022 Virtual Experience
Upstream messages
• Not changing the userid on a QM-to-QM connection is risky
• To prevent this use a mechanism from before to modify userid of channel
• Additionally: PUTAUT
• PUTAUT(CTX)
• Uses userid from the Message
• Combine with channel auth rules
PCF admin message
for Command queue
32. 32
TechCon 2022 Virtual Experience
Authenticating messages
• Applications may wish to validate that the message came from an expected
person
• Advanced Message Security can provide this
Mesesage
33. 33
TechCon 2022 Virtual Experience
Advanced Message security - Integrity
• AMS can be configured to sign messages
• Attaches a cryptographic signature to the message
• Receiving application verifies signature and rejects unexpected
Mesesage
35. 35
TechCon 2022 Virtual Experience
Conclusion
• IBM MQ provides lots of options to authenticate and choose the identity
for authorization.
• A good starting point would be to ask the following:
How will the connection be
authenticated?
How will I get to an identity
for authorization?
What authorities will I give
the identity?
37. TechCon 2022 37
Virtual Experience
Let us know!
Are there Auth security systems you
wish IBM MQ integrated with?
Let us know!
• Raise an AhA Idea!
• Contact me directly
39. TechCon 2022
72 live virtual sessions in 6 tracks
• Application Integration
• AIOps & IT Automation
• Cloud Native Dev & App Mod
• Messaging & Connectivity
• API Management
• Observability & DevOps
Top 3 Reasons To
Attend:
• In depth, interactive
technical sessions
• Access to the top IBM
Architects and
Engineers
• Insights from a Tech
Industry legend, Steve
Wozniak, each day
Audience:
• Architects
• Developers
• Practitioners
• LOB leaders
Targets:
• 2500 registrations
• 1200 attendees
open
here