SlideShare ist ein Scribd-Unternehmen logo
1 von 55
How to transform your messaging
environment to a secure
messaging environment.
Robert Parker – parrobe@uk.ibm.com
IBM Hursley – UK
Introduction
• Aims of this presentation
– Step by step of each security feature in MQ
– Will take an unsecured Queue Manager and secure it
– At the end we will have a secured Queue Manager
• Each security feature section will have:
– What is it and Why do you use it
– Main points of the feature
– How to configure it.
Available Security Features
• Connection Authentication
• Authorization
• Channel Authentication
• SSL/TLS
• Security Exits
• AMS
Security provided on Client to Queue Manager
connections
Channel Authentication
(BLOCKADDR)
SSL/TLS
Channel Authentication
(ADDR/USER/SSL Map)
Security Exit
Connection
Authentication
Channel Authentication
(BLOCKUSER)
Authorization
MQRC_NONE
MQRC_NOT_AUTHORIZED
Or
Security provided on Queue Manager to Queue Manager
connections
Channel Authentication
(BLOCKADDR)
SSL/TLS
Channel Authentication
(ADDR/QMGR/SSL Map)
Security Exit
Authorization
MQ Protocol
The Example Set-up
INTERCONNECT
Client.Data.Q
Client.Connections
• Queue Manager
• Channel Type(SVRCONN)
• Local Queue
• Channel Authentication – Disabled
• Connection Authentication – Disabled
• MQ Administrator set on Channel MCA
• No Security Exit
• SSL/TLS not configured
• AMS not configured
Connection Authentication
Connection Authentication – What is it?
• Authentication is used to force clients to identify themselves.
• It is usually used in combination with authorization.
• Connection authentication was added as a feature of MQ in version 8.
*****
Connection Authentication – Main Points
• MQ allows you to specify levels of security for connections
– Client and local can be set to different levels
– Different client connections can have different levels using Channel
Authentication records.
• Also allows two different user repositories to check supplied credentials
against
– Operating system OAM.
– LDAP Server
*****
Connection Authentication – How to configure it
CHCK…
NONE
OPTIONAL
REQUIRED
REQDADM
MQCONNX
Application (User4)
MQCONNX
Application (User2)
QMGR
INTERCONNECTInter process
Communications
DEFINE AUTHINFO(USE.PW) AUTHTYPE(xxxxxx)
CHCKLOCL(OPTIONAL)
CHCKCLNT(REQUIRED)
ADOPTCTX(NO)
ALTER QMGR CONNAUTH(USE.PW)
REFRESH SECURITY TYPE(CONNAUTH)
MQRC_NOT_AUTHORIZED (2035)
MQRC_NONE (0)
User
Repository
Application (User4)
Connection Authentication – How to configure it
DEFINE AUTHINFO(USE.OS) AUTHTYPE(IDPWOS)
DEFINE AUTHINFO(USE.LDAP) AUTHTYPE(IDPWLDAP)
CONNAME(‘ldap1(389),ldap2(389)’)
LDAPUSER(‘CN=QMGR1’)
LDAPPWD(‘passw0rd’) SECCOMM(YES)
MQCONNX
User1 + pwd1
Application (User2)
QMGR
INTERCONNECT
O/S User
Repository
(z/OS + Dist)
LDAP Server (Dist only)
Connection Authentication – How to configure it
DEFINE AUTHINFO(USE.PW) AUTHTYPE(xxxxxx)
CHCKCLNT(OPTIONAL)
SET CHLAUTH(‘*’) TYPE(ADDRESSMAP) ADDRESS(‘*’)
USERSRC(CHANNEL) CHCKCLNT(REQUIRED)
ADOPTCTX(NO)
SET CHLAUTH(‘*’) TYPE(SSLPEERMAP)
SSLPEER(‘CN=*’) USERSRC(CHANNEL)
CHCKCLNT(ASQMGR)
CHCKCLNT
ASQMGR
REQUIRED
REQDADM
QMgr
User's Digital
Certificate
CA
Sig
MQCONNX
User1 + pwd1
Application (User2)
MQRC_NONE (0)
SSL/TLS Network
Communications
MQCONNX
User3 + pwd3
Application (User4)
MQRC_NOT_AUTHORIZED (2035)
Connection Authentication – How to configure it
MQCNO cno = {MQCNO_DEFAULT};
cno.Version = MQCNO_VERSION_5;
cno.SecurityParmsPtr = &csp;
MQCONNX(QMName,
&cno,
&hConn,
&CompCode,
&Reason);
MQCSP csp = {MQCSP_DEFAULT};
csp.AuthenticationType = MQCSP_AUTH_USER_ID_AND_PWD;
csp.CSPUserIdPtr = "hughson";
csp.CSPUserIdLength = 7; /* Max: MQ_CLIENT_USER_ID_LENGTH */
csp.CSPPasswordPtr = "passw0rd";
csp.CSPPasswordLength = 8; /* Max: MQ_CSP_PASSWORD_LENGTH */
• Procedural MQI changes:
• MQCSP structure
– Connection Security Parameters
– User ID and password
• MQCNO structure
– Connection Options
Connection Authentication – How to configure it
• Object Oriented MQ classes changes
• JMS/XMS classes changes
MQEnvironment.properties = new Hashtable();
MQEnvironment.userID = "hughson";
MQEnvironment.password ="passw0rd";
System.out.println("Connecting to queue manager");
MQQueueManager qMgr = new MQQueueManager(QMName);
cf = getCF();
System.out.println("Creating the Connection with UID and Password");
Connection conn = cf.createConnection("hughson", "passw0rd");
Authorization
Authorization – What is it?
• Authorization is used to limit what connected applications can do.
• Authority can be given on a per group basis
– Windows allows per user
• Authority to perform an action is given.
– By default a user/group will not have any authority
• Best practice is to only grant minimum required authority
Authorization – Main points
• Each object in MQ can have separate authorities for each user/group
– Additionally you can also supply a generic object name
• MQ supplies 5 tools to view and modify authority records
– MQ Explorer
• Display, create and alter authority records for all objects
– runmqsc
• Display, create & Alter Authority records for all objects
– setmqaut
• Create & Alter authority records for requested objects
– dspmqaut
• Displays authority records for requested objects
– dmpmqaut
• Outputs authority records for requested objects, output can be inputted into QMGR.
• What user/group is used for the authority check depends on what happens before…
Authorization – Main points
Method Notes
Client machine user ID flowed to
server
This will be over-ridden by anything else. Rarely do you want
to trust an unauthenticated client side user ID.
MCAUSER set on SVRCONN
channel definition
A handy trick to ensure that the client flowed ID is never used
is to define the MCAUSER as ‘rubbish’ and then anything that
is not set appropriately by one of the next methods cannot
connect.
MCAUSER set by ADOPTCTX(YES) The queue manager wide setting to adopt the password
authenticated user ID as the MCAUSER will over-ride either
of the above.
MCAUSER set by CHLAUTH rule To allow more granular control of MCAUSER setting, rather
than relying on the above queue manager wide setting, you
can of course use CHLAUTH rules
MCAUSER set by Security Exit Although CHLAUTH gets the final say on whether a
connection is blocked (security exit not called in that case),
the security exit does get called with the MCAUSER
CHLAUTH has decided upon, and can change it.
Authorization – How to configure it
• Example 1: Granting clients the ability to read to the Queue
– Here we will give the group “readers” authority to connect
– In a command prompt
• Queue Manager to create authority record for
• Object type you are creating authority record for
• Group to give authority to
• Authorities
– + will grant authority
– - will remove authority
Setmqaut –m INTERCONNECT –t qmgr –g readers +connect
Authorization – How to configure it
• Example 1: Granting clients the ability to read to the Queue
– Here we will give the group “readers” GET and BROWSE authority
– In runmqsc.
• Object to grant authorities for
• Object type
• Group to grant authority
• Authority to add
SET AUTHREC PROFILE(CLIENT.DATA.Q) OBJTYPE(QUEUE) +
GROUP(‘readers’) AUTHADD(GET) AUTHADD(BROWSE)
Channel Authentication Records
Channel Authentication – What is it?
• Allows Granular control over connections
– Can Supply a whitelist or blacklist to block or allow connections
• Can filter on:
– SSL distinguished name (both issuer and subject)
– Client user ID
– Remote Queue Manager name
– IP/Hostname
• Blocking at channel (ADDRESSMAP) or listener (BLOCKADDR) level
• Values used in filters can be specific or generic
Channel Authentication – Main Points
• Specific rules have higher precedence than generic rules
– 1) Addressmap blocking ‘*’
2) Addressmap allowing ‘127.0.0.1’
– Any connections from 127.0.0.1 will be allowed by (2).
– Other connections blocked by (1)
• When creating Channel Authentication rule you can set it to use a
different User ID for future Authority checks:
1. NOACCESS – Blocks the connection regardless
2. CHANNEL – Use the User ID specified in Channel MCA
• If this is blank then we use the userid supplied by application
3. MAP – Use the User ID specified in this rule.
Channel Authentication – How to configure it.
• Example 1: Blacklisting bad connections
– Aim: Block connections from 129.1.198.X
• In Rumqsc:
• Channel name
• Rule type
• Address to match to
• Action
• Warn
SET CHLAUTH(‘CLIENT.CONNECTIONS’) TYPE(ADDRESSMAP) +
ADDRESS(‘129.1.198.*’) USERSRC(NOACCESS) WARN(NO)
Channel Authentication – How to configure it.
• Example 2: Whitelisting good connections
– Aim: Block connections all connections except from 129.198.1.7
• In Rumqsc:
SET CHLAUTH(‘CLIENT.CONNECTIONS’) TYPE(ADDRESSMAP) +
ADDRESS(‘*’) USERSRC(NOACCESS) WARN(NO)
SET CHLAUTH(‘CLIENT.CONNECTIONS’) TYPE(ADDRESSMAP) +
ADDRESS(‘129.198.1.7’) USERSRC(CHANNEL)
Channel Authentication – How to configure it.
• In MQ Explorer:
SSL/TLS
SSL/TLS – What is it?
• SSL/TLS is used for two reasons in MQ:
– Authentication with a Queue Manager
– Encrypting and protecting data in transit between a client or Queue Manager
and destination Queue Manager.
• Uses a certificate containing a public-private key pair in order to
establish a secure link.
– Called an SSL Handshake.
• During the SSL Handshake, asymmetric encryption is used.
– Once the handshake is completed symmetric encryption is used to transfer
data.
SSL/TLS – Main Points
• Channels are enabled for SSL/TLS by setting a CipherSpec.
– Only one CipherSpec can be used on a channel.
• A server Queue Manager must have a certificate
• A client application (or client Queue Manager) does not require a
certificate.
– But does require a copy of the server Queue Manager’s public certificate.
• As of MQ v8 a channel can use a different certificate than the Queue
Manager it is defined on.
SSL/TLS – Main Points
• MQ Supplies 3 tools for your certificate and key repository management
needs:
– strmqikm (or IBM Key Management)
• IBM JRE GUI tool for managing certificates
– runmqckm
• command line tool to manage certificates – can handle JKCS repositories
– runmqakm
• Command line tool to manage certificates – can handle Elliptic Curve certificates
• Default location for Queue Manager Key Repository is
– <MQ Data Root>/qmgrs/<QM Name>/ssl/key.kdb
• Can be changed using Queue Manager SSLKEYR attribute
• Default certificate used by the Queue Manager is
– Ibmwebspheremq<qmname>
• Can be changed in MQ v8+ using Queue Manager CERTLABL attribute
SSL/TLS – How to configure it
• Example 1: Setting up a Queue Manager to use SSL/TLS
• First create the Key Repository the Queue Manager will use:
– In a command prompt:
• What we are altering
• Action to perform
• Name and location of key repository to create
• Password to access the key repository
• Tells runmqakm to stash the password which is used by MQ.
runmqakm –keydb –create –db
/var/mqm/qmgrs/INTERCONNECT/ssl/key.kdb –pw passw0rd -stash
SSL/TLS – How to configure it
• Example 1: Setting up a Queue Manager to use SSL/TLS
• Next create the Queue Manager’s certificate
– In a command prompt
• What we are altering
• The action to perform
• Where to store the certificate
• Tells runmqakm to use the stash file to access the key repository
• The distinguished name to give the certificate
• The label to refer to the certificate
runmqakm –cert –create –db
/var/mqm/qmgrs/INTERCONNECT/ssl/key.kdb –stashed –dn
“CN=INTERCONNECT,OU=MQ,O=IBM,C=UK” –label
ibmwebspheremqinterconnect
SSL/TLS – How to configure it
• Example 1: Setting up a Queue Manager to use SSL/TLS
• Next set the Queue Manager to use Key Repository
– Unless you are using defaults
– In runmqsc
• Location of the key repository to use
– No file extension!
• Label of certificate to use
ALTER QMGR SSLKEYR(‘/var/mqm/qmgrs/INTERCONNECT/ssl/key’) +
CERTLABL(‘ibmwebspheremqinterconnect’)
SSL/TLS – How to configure it
• Example 1: Setting up a Queue Manager to use SSL/TLS
• Finally set a channel to use SSL
– In runmqsc
• Channel name
• Whether to use mutual authentication
• The CipherSpec to use on this channel
ALTER CHANNEL(‘CLIENT.CONNECTIONS’) SSLCAUTH(REQUIRED) +
SSLCIPH(TLS_RSA_WITH_AES_128_CBC_SHA256)
SSL/TLS – How to configure it
• Example 1: Client application changes
• MQSCO structure
– SSL Security Parameters
– Location of Key Repository
– Certificate label to use (MQ v8 Only)
• MQCNO structure
– Connection Options
MQCNO cno = {MQCNO_DEFAULT};
cno.Version = MQCNO_VERSION_4;
cno.SSLConfigPtr = &sco;
MQCONNX(QMName,
&cno,
&hConn,
&CompCode,
&Reason);
MQSCO sco = {MQSCO_DEFAULT};
sco.version = MQSCO_VERSION_5
sco.KeyRepository = “/var/client/clientkeyr”;
Sco.CertificateLabel = “clientcertificate”
SSL/TLS – How to configure it
• Example 1: Client application
• Alternatively if you cannot adjust your application
– In command prompt
EXPORT MQSSLKEYR=var/client/clientkeyr
EXPORT MQCERTLABL=clientcertificate
SSL/TLS – How to configure it
• Example 1: Client application
– Ensure the certificate trust chain is complete on each side
ibmwebspheremqinterconnect
Queue Manager KeystoreClient Keystore
runmqakm –cert –extract –db
/var/mqm/qmgrs/INTERCONNECT/ssl/key.kdb –stashed –label
ibmwebspheremqinterconnect –file /var/certs/qmgr.cer
Qmgr.cer
SSL/TLS – How to configure it
• Example 1: Client application
– Ensure the certificate trust chain is complete on each side
ibmwebspheremqinterconnect
Queue Manager KeystoreClient Keystore
runmqakm –cert –add –db /var/client/clientkeyr.kdb –stashed
–label qmgrsignercert –file /var/certs/qmgr.cer
Qmgr.cerqmgrsignercert
SSL/TLS – How to configure it
• Example 1: Client application (Mutual Authentication)
– Ensure the certificate trust chain is complete on each side
ibmwebspheremqinterconnect
Queue Manager KeystoreClient Keystore
client.cerqmgrsignercert
clientcertificate
clientsignercert
runmqakm –cert –extract –db /var/client/clientkeyr.kdb
–stashed –label clientcertificate –file
/var/certs/client.cer
runmqakm –cert –add –db
/var/mqm/qmgrs/INTERCONNECT/ssl/key.kdb –stashed –label
clientsignercert –file /var/certs/client.cer
Security Exits
Security Exits – What is it?
• Security exits are bespoke, customer created exists that are ran during
the security checks.
• MQ contains an API used in the security exits to extract information
about an incoming connection.
– This information can then be used in the security exit to determine whether
to allow or disallow a connection.
• Prior to MQ v8 a security exit was used in MVS to supply connection
authentication capabilities
– CSQ4BCX3
Security Exits – Main Points
• Security exits are stored in <MQ Data Root>/exits/<Installation name>
– MQ will look in this folder when an exit is attached to a channel
• Exits are referenced in SCYEXIT channel attribute
– Without the file suffix or location
• As well as security exits there are also:
– Receive exits – RCVEXIT
– Send exits – SENDEXIT
• For each exit you can also supply custom data to pass to the exit using
the channel’s ***DATA attribute
– For example Security exit data using SCYDATA
Security Exits – How to Configure it
• First write a C Application with the following skeleton code:
void MQENTRY MQStart() {;}
void MQENTRY EntryPoint (PMQVOID pChannelExitParms,
PMQVOID pChannelDefinition,
PMQLONG pDataLength,
PMQLONG pAgentBufferLength,
PMQVOID pAgentBuffer,
PMQLONG pExitBufferLength,
PMQPTR pExitBufferAddr)
{
PMQCXP pParms = (PMQCXP)pChannelExitParms;
PMQCD pChDef = (PMQCD)pChannelDefinition;
/* TODO: Add Security Exit Code Here */
}
Security Exits – How to Configure it
• Next compile and link the exit as a Dynamic library and place in:
– <MQ Data Root>/exits/<Installation name>
Security Exits – How to Configure it
• Next specify the exit on the channel:
– In runmqsc
• Channel name
• Name of security exit to run
– Without location or file extension
• Custom data to pass to the security exit
ALTER CHANNEL(‘CLIENT.CONNECTIONS’) SCYEXIT(‘mqccred’) +
SCYDATA(‘sec exit data’)
Advanced Messaging Security
AMS – What is it?
• AMS provides a higher level of protection to messages
• Has two levels of protection - policies
– Integrity protection
• Prevents messages from being tampered with.
• Guarantees message has been received from known source
– Integrity and privacy protection
• Same benefits as Integrity protection
• Also provides encryption to prevent unauthorised recipients seeing message
• AMS does not perform access control but simply provides privacy and
integrity to messages.
• Messages are protected using certificates that each signer and recipient will
need.
– Depending on level of protection
!*54%
@”p
AMS – Main points
• It is an end-to-end security model
– Messages are protected from creation until destruction
• Messages can be protected so that only authorised users can see message data
– This means even MQ Administrators cannot view a message.
• Messages are protected both in transit and at rest
– Satisfies the standards compliance for certain data types (HIPAA, PCI, etc)
• AMS is incorporated into MQ Client applications without the need for re-building
applications
– No code changes are necessary!
• Message size will increase in order to incorporate AMS format
– New message size = 1280 + [Old Message Length] + (200 x [# of recipients])
!*54%
@”p
AMS – Main points
• Unlike SSL, it requires the FULL trust chain
– Subject certificate, signer certificate, signer’s signer certificate, etc
• MQ has three tools for defining and managing policies
– MQ Explorer
• Define, display, delete policies
– setmqspl
• define, delete policies
– dspmqspl
• Display policies
!*54%
@”p
AMS – How to configure it
• Example 1: Configuring MQ to protect messages
– In a command prompt:
• Queue Manager
• Queue to protect
• Signing algorithm
• Authorised signer(s)
• Encryption algorithm
• Authorised recipient(s)
!*54%
@”p
setmqspl -m INTERCONNECT -p CLIENT.DATA.Q -s SHA512 -a
"CN=CLIENT1,O=CLIENTORG,C=UK" -e AES256 -r
"CN=CLIENT2,O=CLIENTORG,C=UK"
AMS – How to configure it
• Example 1: Application changes
!*54%
@”p
Alice’s
Sending/Receiving
App
AliceCertificate
MQS_KEYSTORE_CONF=/…/Keystore.conf
(Or create Keystore.conf in home directory)
No Changes Necessary!
Keystore.conf
cms.keystore=/…/Keystore
cms.certificate=AliceCertificate
Keystore
Notices and Disclaimers
Copyright © 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any
form without written permission from IBM.
U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for
accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to
update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL
IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS
INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of
the agreements under which they are provided.
Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice.
Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as
illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or
other results in other operating environments may vary.
References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or
services available in all countries in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the
views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal
or other guidance or advice to any individual participant or their specific situation.
It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to
the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions
the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products
will ensure that the customer is in compliance with any law.
52
Notices and Disclaimers (con’t)
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly
available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance,
compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the
suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to
interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights,
trademarks or other intellectual property right.
•IBM, the IBM logo, ibm.com, Bluemix, Blueworks Live, CICS, Clearcase, DOORS®, Enterprise Document Management System™, Global Business
Services ®, Global Technology Services ®, Information on Demand, ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON,
OpenPower, PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®, PureData®, PureExperience®, PureFlex®, pureQuery®, pureScale®,
PureSystems®, QRadar®, Rational®, Rhapsody®, SoDA, SPSS, StoredIQ, Tivoli®, Trusteer®, urban{code}®, Watson, WebSphere®, Worklight®, X-
Force® and System z® Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other
product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at
"Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.
Where can I get more information?
IBM Messaging developerWorks
developer.ibm.com/messaging
IBM Messaging Youtube
https://www.youtube.com/IBMmessagingMedia
LinkedIn
Ibm.biz/ibmmessaging
Twitter
@IBMMessaging
IBM MQ Facebook
Facebook.com/IBM-MQ-8304628654/
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

IBM WebSphere MQ Introduction
IBM WebSphere MQ Introduction IBM WebSphere MQ Introduction
IBM WebSphere MQ Introduction ejlp12
 
Websphere MQ (MQSeries) fundamentals
Websphere MQ (MQSeries) fundamentalsWebsphere MQ (MQSeries) fundamentals
Websphere MQ (MQSeries) fundamentalsBiju Nair
 
IBM MQ High Availability 2019
IBM MQ High Availability 2019IBM MQ High Availability 2019
IBM MQ High Availability 2019David Ware
 
IBM MQ Clustering (2017 version)
IBM MQ Clustering (2017 version)IBM MQ Clustering (2017 version)
IBM MQ Clustering (2017 version)MarkTaylorIBM
 
Building an Active-Active IBM MQ System
Building an Active-Active IBM MQ SystemBuilding an Active-Active IBM MQ System
Building an Active-Active IBM MQ Systemmatthew1001
 
Rhel cluster basics 1
Rhel cluster basics   1Rhel cluster basics   1
Rhel cluster basics 1Manoj Singh
 
[OpenStack Days Korea 2016] Track3 - VDI on OpenStack with LeoStream Connecti...
[OpenStack Days Korea 2016] Track3 - VDI on OpenStack with LeoStream Connecti...[OpenStack Days Korea 2016] Track3 - VDI on OpenStack with LeoStream Connecti...
[OpenStack Days Korea 2016] Track3 - VDI on OpenStack with LeoStream Connecti...OpenStack Korea Community
 
IBM Cloud Integration Platform High Availability - Integration Tech Conference
IBM Cloud Integration Platform High Availability - Integration Tech ConferenceIBM Cloud Integration Platform High Availability - Integration Tech Conference
IBM Cloud Integration Platform High Availability - Integration Tech ConferenceRobert Nicholson
 
Controlling access to your IBM MQ System
Controlling access to your IBM MQ SystemControlling access to your IBM MQ System
Controlling access to your IBM MQ SystemRobert Parker
 
WebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesWebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesMorag Hughson
 
IBM MQ - What's new in 9.2
IBM MQ - What's new in 9.2IBM MQ - What's new in 9.2
IBM MQ - What's new in 9.2David Ware
 
IBM MQ Whats new - including 9.3 and 9.3.1
IBM MQ Whats new - including 9.3 and 9.3.1IBM MQ Whats new - including 9.3 and 9.3.1
IBM MQ Whats new - including 9.3 and 9.3.1Robert Parker
 
IBM Think 2018: IBM MQ High Availability
IBM Think 2018: IBM MQ High AvailabilityIBM Think 2018: IBM MQ High Availability
IBM Think 2018: IBM MQ High AvailabilityJamie Squibb
 
IBM MQ Disaster Recovery
IBM MQ Disaster RecoveryIBM MQ Disaster Recovery
IBM MQ Disaster RecoveryMarkTaylorIBM
 
HandsOn ProxySQL Tutorial - PLSC18
HandsOn ProxySQL Tutorial - PLSC18HandsOn ProxySQL Tutorial - PLSC18
HandsOn ProxySQL Tutorial - PLSC18Derek Downey
 
Fault tolerant and scalable ibm mq
Fault tolerant and scalable ibm mqFault tolerant and scalable ibm mq
Fault tolerant and scalable ibm mqDavid Ware
 
IBM MQ Update, including 9.1.2 CD
IBM MQ Update, including 9.1.2 CDIBM MQ Update, including 9.1.2 CD
IBM MQ Update, including 9.1.2 CDDavid Ware
 
Where is my MQ message on z/OS?
Where is my MQ message on z/OS?Where is my MQ message on z/OS?
Where is my MQ message on z/OS?Matt Leming
 
IBM Websphere MQ Basic
IBM Websphere MQ BasicIBM Websphere MQ Basic
IBM Websphere MQ BasicPRASAD BHATKAR
 

Was ist angesagt? (20)

IBM WebSphere MQ Introduction
IBM WebSphere MQ Introduction IBM WebSphere MQ Introduction
IBM WebSphere MQ Introduction
 
Websphere MQ (MQSeries) fundamentals
Websphere MQ (MQSeries) fundamentalsWebsphere MQ (MQSeries) fundamentals
Websphere MQ (MQSeries) fundamentals
 
IBM MQ High Availability 2019
IBM MQ High Availability 2019IBM MQ High Availability 2019
IBM MQ High Availability 2019
 
IBM MQ Clustering (2017 version)
IBM MQ Clustering (2017 version)IBM MQ Clustering (2017 version)
IBM MQ Clustering (2017 version)
 
Building an Active-Active IBM MQ System
Building an Active-Active IBM MQ SystemBuilding an Active-Active IBM MQ System
Building an Active-Active IBM MQ System
 
WebSphere MQ tutorial
WebSphere MQ tutorialWebSphere MQ tutorial
WebSphere MQ tutorial
 
Rhel cluster basics 1
Rhel cluster basics   1Rhel cluster basics   1
Rhel cluster basics 1
 
[OpenStack Days Korea 2016] Track3 - VDI on OpenStack with LeoStream Connecti...
[OpenStack Days Korea 2016] Track3 - VDI on OpenStack with LeoStream Connecti...[OpenStack Days Korea 2016] Track3 - VDI on OpenStack with LeoStream Connecti...
[OpenStack Days Korea 2016] Track3 - VDI on OpenStack with LeoStream Connecti...
 
IBM Cloud Integration Platform High Availability - Integration Tech Conference
IBM Cloud Integration Platform High Availability - Integration Tech ConferenceIBM Cloud Integration Platform High Availability - Integration Tech Conference
IBM Cloud Integration Platform High Availability - Integration Tech Conference
 
Controlling access to your IBM MQ System
Controlling access to your IBM MQ SystemControlling access to your IBM MQ System
Controlling access to your IBM MQ System
 
WebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesWebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changes
 
IBM MQ - What's new in 9.2
IBM MQ - What's new in 9.2IBM MQ - What's new in 9.2
IBM MQ - What's new in 9.2
 
IBM MQ Whats new - including 9.3 and 9.3.1
IBM MQ Whats new - including 9.3 and 9.3.1IBM MQ Whats new - including 9.3 and 9.3.1
IBM MQ Whats new - including 9.3 and 9.3.1
 
IBM Think 2018: IBM MQ High Availability
IBM Think 2018: IBM MQ High AvailabilityIBM Think 2018: IBM MQ High Availability
IBM Think 2018: IBM MQ High Availability
 
IBM MQ Disaster Recovery
IBM MQ Disaster RecoveryIBM MQ Disaster Recovery
IBM MQ Disaster Recovery
 
HandsOn ProxySQL Tutorial - PLSC18
HandsOn ProxySQL Tutorial - PLSC18HandsOn ProxySQL Tutorial - PLSC18
HandsOn ProxySQL Tutorial - PLSC18
 
Fault tolerant and scalable ibm mq
Fault tolerant and scalable ibm mqFault tolerant and scalable ibm mq
Fault tolerant and scalable ibm mq
 
IBM MQ Update, including 9.1.2 CD
IBM MQ Update, including 9.1.2 CDIBM MQ Update, including 9.1.2 CD
IBM MQ Update, including 9.1.2 CD
 
Where is my MQ message on z/OS?
Where is my MQ message on z/OS?Where is my MQ message on z/OS?
Where is my MQ message on z/OS?
 
IBM Websphere MQ Basic
IBM Websphere MQ BasicIBM Websphere MQ Basic
IBM Websphere MQ Basic
 

Andere mochten auch

Experiments with Randomisation and Boosting for Multi-instance Classification
Experiments with Randomisation and Boosting for Multi-instance ClassificationExperiments with Randomisation and Boosting for Multi-instance Classification
Experiments with Randomisation and Boosting for Multi-instance ClassificationLARCA UPC
 
MQTC 2016 - IBM MQ Security: Overview & recap
MQTC 2016 - IBM MQ Security: Overview & recapMQTC 2016 - IBM MQ Security: Overview & recap
MQTC 2016 - IBM MQ Security: Overview & recapRobert Parker
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approachSarah R. Dowlath
 
Advanced Crypto Service Provider – cryptography as a service
Advanced Crypto Service Provider – cryptography as a serviceAdvanced Crypto Service Provider – cryptography as a service
Advanced Crypto Service Provider – cryptography as a serviceSmart Coders
 
Recover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecyRecover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecyPriyanka Aash
 
CTU 2017 - I168 IBM MQ in the cloud
CTU 2017 - I168 IBM MQ in the cloudCTU 2017 - I168 IBM MQ in the cloud
CTU 2017 - I168 IBM MQ in the cloudRobert Parker
 
Unified log-meetup-20160420
Unified log-meetup-20160420Unified log-meetup-20160420
Unified log-meetup-20160420Oli Deakin
 
MQTC 2016: IBM MQ Security deep dive including AMS
MQTC 2016: IBM MQ Security deep dive including AMSMQTC 2016: IBM MQ Security deep dive including AMS
MQTC 2016: IBM MQ Security deep dive including AMSRobert Parker
 
3450 - Writing and optimising applications for performance in a hybrid messag...
3450 - Writing and optimising applications for performance in a hybrid messag...3450 - Writing and optimising applications for performance in a hybrid messag...
3450 - Writing and optimising applications for performance in a hybrid messag...Timothy McCormick
 
3425 - Using publish/subscribe to integrate applications
3425 - Using publish/subscribe to integrate applications3425 - Using publish/subscribe to integrate applications
3425 - Using publish/subscribe to integrate applicationsTimothy McCormick
 
Apache kafka- Onkar Kadam
Apache kafka- Onkar KadamApache kafka- Onkar Kadam
Apache kafka- Onkar KadamOnkar Kadam
 
An analysis of TLS handshake proxying
An analysis of TLS handshake proxyingAn analysis of TLS handshake proxying
An analysis of TLS handshake proxyingNick Sullivan
 
Kubernetes в Avito - Евгений Ольков
Kubernetes в Avito - Евгений ОльковKubernetes в Avito - Евгений Ольков
Kubernetes в Avito - Евгений ОльковAvitoTech
 
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)Gabriella Davis
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM DominoJared Roberts
 
Introducing IBM Message Hub: Cloud-scale messaging based on Apache Kafka
Introducing IBM Message Hub: Cloud-scale messaging based on Apache KafkaIntroducing IBM Message Hub: Cloud-scale messaging based on Apache Kafka
Introducing IBM Message Hub: Cloud-scale messaging based on Apache KafkaAndrew Schofield
 
HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...
 HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen... HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...
HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...Matt Leming
 
#1922 rest-push2 ap-im-v6
#1922 rest-push2 ap-im-v6#1922 rest-push2 ap-im-v6
#1922 rest-push2 ap-im-v6Jack Carnes
 
WhatsNewIBMIntegrationBus10FP4
WhatsNewIBMIntegrationBus10FP4WhatsNewIBMIntegrationBus10FP4
WhatsNewIBMIntegrationBus10FP4bthomps1979
 

Andere mochten auch (20)

Experiments with Randomisation and Boosting for Multi-instance Classification
Experiments with Randomisation and Boosting for Multi-instance ClassificationExperiments with Randomisation and Boosting for Multi-instance Classification
Experiments with Randomisation and Boosting for Multi-instance Classification
 
MQTC 2016 - IBM MQ Security: Overview & recap
MQTC 2016 - IBM MQ Security: Overview & recapMQTC 2016 - IBM MQ Security: Overview & recap
MQTC 2016 - IBM MQ Security: Overview & recap
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
 
Advanced Crypto Service Provider – cryptography as a service
Advanced Crypto Service Provider – cryptography as a serviceAdvanced Crypto Service Provider – cryptography as a service
Advanced Crypto Service Provider – cryptography as a service
 
Recover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecyRecover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecy
 
CTU 2017 - I168 IBM MQ in the cloud
CTU 2017 - I168 IBM MQ in the cloudCTU 2017 - I168 IBM MQ in the cloud
CTU 2017 - I168 IBM MQ in the cloud
 
Unified log-meetup-20160420
Unified log-meetup-20160420Unified log-meetup-20160420
Unified log-meetup-20160420
 
MQTC 2016: IBM MQ Security deep dive including AMS
MQTC 2016: IBM MQ Security deep dive including AMSMQTC 2016: IBM MQ Security deep dive including AMS
MQTC 2016: IBM MQ Security deep dive including AMS
 
3450 - Writing and optimising applications for performance in a hybrid messag...
3450 - Writing and optimising applications for performance in a hybrid messag...3450 - Writing and optimising applications for performance in a hybrid messag...
3450 - Writing and optimising applications for performance in a hybrid messag...
 
3425 - Using publish/subscribe to integrate applications
3425 - Using publish/subscribe to integrate applications3425 - Using publish/subscribe to integrate applications
3425 - Using publish/subscribe to integrate applications
 
Apache kafka- Onkar Kadam
Apache kafka- Onkar KadamApache kafka- Onkar Kadam
Apache kafka- Onkar Kadam
 
An analysis of TLS handshake proxying
An analysis of TLS handshake proxyingAn analysis of TLS handshake proxying
An analysis of TLS handshake proxying
 
Kubernetes в Avito - Евгений Ольков
Kubernetes в Avito - Евгений ОльковKubernetes в Avito - Евгений Ольков
Kubernetes в Avito - Евгений Ольков
 
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
 
Automation and ansible
Automation and ansibleAutomation and ansible
Automation and ansible
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM Domino
 
Introducing IBM Message Hub: Cloud-scale messaging based on Apache Kafka
Introducing IBM Message Hub: Cloud-scale messaging based on Apache KafkaIntroducing IBM Message Hub: Cloud-scale messaging based on Apache Kafka
Introducing IBM Message Hub: Cloud-scale messaging based on Apache Kafka
 
HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...
 HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen... HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...
HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...
 
#1922 rest-push2 ap-im-v6
#1922 rest-push2 ap-im-v6#1922 rest-push2 ap-im-v6
#1922 rest-push2 ap-im-v6
 
WhatsNewIBMIntegrationBus10FP4
WhatsNewIBMIntegrationBus10FP4WhatsNewIBMIntegrationBus10FP4
WhatsNewIBMIntegrationBus10FP4
 

Ähnlich wie 3429 How to transform your messaging environment to a secure messaging environment.

MQ Security Overview
MQ Security OverviewMQ Security Overview
MQ Security OverviewMarkTaylorIBM
 
CTU 2017 I173 - how to transform your messaging environment to a secure messa...
CTU 2017 I173 - how to transform your messaging environment to a secure messa...CTU 2017 I173 - how to transform your messaging environment to a secure messa...
CTU 2017 I173 - how to transform your messaging environment to a secure messa...Robert Parker
 
IBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep DiveIBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep DiveMorag Hughson
 
IBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM Systems UKI
 
Securing your IBM MQ environment.
Securing your IBM MQ environment.Securing your IBM MQ environment.
Securing your IBM MQ environment.Robert Parker
 
Introduction to MariaDb
Introduction to MariaDbIntroduction to MariaDb
Introduction to MariaDbBehzadDara
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data planeNetProtocol Xpert
 
Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter PresentationBeny Haddad
 
MTLS - Securing Microservice Architecture with Mutual TLS Authentication
MTLS - Securing Microservice Architecture with Mutual TLS AuthenticationMTLS - Securing Microservice Architecture with Mutual TLS Authentication
MTLS - Securing Microservice Architecture with Mutual TLS AuthenticationLaurentiu Meirosu
 
010 sa302 aaa+ldap
010 sa302 aaa+ldap010 sa302 aaa+ldap
010 sa302 aaa+ldapBabaa Naya
 
010 sa302 aaa+ldap
010 sa302 aaa+ldap010 sa302 aaa+ldap
010 sa302 aaa+ldapBabaa Naya
 
531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ systemRobert Parker
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETERHossein Yavari
 
IBM WebSphere MQ for z/OS - Security
IBM WebSphere MQ for z/OS - SecurityIBM WebSphere MQ for z/OS - Security
IBM WebSphere MQ for z/OS - SecurityDamon Cross
 
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...ScyllaDB
 
IBM MQ V8 Security: Latest Features Deep-Dive
IBM MQ V8 Security: Latest Features Deep-DiveIBM MQ V8 Security: Latest Features Deep-Dive
IBM MQ V8 Security: Latest Features Deep-DiveMorag Hughson
 
The Three Musketeers (Authentication, Authorization, Accounting)
The Three Musketeers (Authentication, Authorization, Accounting)The Three Musketeers (Authentication, Authorization, Accounting)
The Three Musketeers (Authentication, Authorization, Accounting)Sarah Conway
 
Dynamic Service Chaining
Dynamic Service Chaining Dynamic Service Chaining
Dynamic Service Chaining Tail-f Systems
 

Ähnlich wie 3429 How to transform your messaging environment to a secure messaging environment. (20)

MQ Security Overview
MQ Security OverviewMQ Security Overview
MQ Security Overview
 
CTU 2017 I173 - how to transform your messaging environment to a secure messa...
CTU 2017 I173 - how to transform your messaging environment to a secure messa...CTU 2017 I173 - how to transform your messaging environment to a secure messa...
CTU 2017 I173 - how to transform your messaging environment to a secure messa...
 
IBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep DiveIBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep Dive
 
IBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM MQ Channel Authentication
IBM MQ Channel Authentication
 
AAA Implementation
AAA ImplementationAAA Implementation
AAA Implementation
 
Securing your IBM MQ environment.
Securing your IBM MQ environment.Securing your IBM MQ environment.
Securing your IBM MQ environment.
 
Introduction to MariaDb
Introduction to MariaDbIntroduction to MariaDb
Introduction to MariaDb
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter Presentation
 
MTLS - Securing Microservice Architecture with Mutual TLS Authentication
MTLS - Securing Microservice Architecture with Mutual TLS AuthenticationMTLS - Securing Microservice Architecture with Mutual TLS Authentication
MTLS - Securing Microservice Architecture with Mutual TLS Authentication
 
010 sa302 aaa+ldap
010 sa302 aaa+ldap010 sa302 aaa+ldap
010 sa302 aaa+ldap
 
010 sa302 aaa+ldap
010 sa302 aaa+ldap010 sa302 aaa+ldap
010 sa302 aaa+ldap
 
531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETER
 
Large scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear passLarge scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear pass
 
IBM WebSphere MQ for z/OS - Security
IBM WebSphere MQ for z/OS - SecurityIBM WebSphere MQ for z/OS - Security
IBM WebSphere MQ for z/OS - Security
 
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...
 
IBM MQ V8 Security: Latest Features Deep-Dive
IBM MQ V8 Security: Latest Features Deep-DiveIBM MQ V8 Security: Latest Features Deep-Dive
IBM MQ V8 Security: Latest Features Deep-Dive
 
The Three Musketeers (Authentication, Authorization, Accounting)
The Three Musketeers (Authentication, Authorization, Accounting)The Three Musketeers (Authentication, Authorization, Accounting)
The Three Musketeers (Authentication, Authorization, Accounting)
 
Dynamic Service Chaining
Dynamic Service Chaining Dynamic Service Chaining
Dynamic Service Chaining
 

Mehr von Robert Parker

Simplifying IBM MQ Security in your MQ estate
Simplifying IBM MQ Security in your MQ estateSimplifying IBM MQ Security in your MQ estate
Simplifying IBM MQ Security in your MQ estateRobert Parker
 
IBM MQ Token Authentication.pdf
IBM MQ Token Authentication.pdfIBM MQ Token Authentication.pdf
IBM MQ Token Authentication.pdfRobert Parker
 
IBM MQ Whats new - up to 9.3.4.pdf
IBM MQ Whats new - up to 9.3.4.pdfIBM MQ Whats new - up to 9.3.4.pdf
IBM MQ Whats new - up to 9.3.4.pdfRobert Parker
 
M08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryptionM08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryptionRobert Parker
 
MQ Guide France - IBM MQ and Containers
MQ Guide France - IBM MQ and ContainersMQ Guide France - IBM MQ and Containers
MQ Guide France - IBM MQ and ContainersRobert Parker
 
MQ Guide France - What's new in ibm mq 9.1.4
MQ Guide France - What's new in ibm mq 9.1.4MQ Guide France - What's new in ibm mq 9.1.4
MQ Guide France - What's new in ibm mq 9.1.4Robert Parker
 
M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019Robert Parker
 
M10: How to implement mq in a containerized architecture ITC 2019
M10: How to implement mq in a containerized architecture ITC 2019M10: How to implement mq in a containerized architecture ITC 2019
M10: How to implement mq in a containerized architecture ITC 2019Robert Parker
 
M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019Robert Parker
 
Running IBM MQ in the Cloud
Running IBM MQ in the CloudRunning IBM MQ in the Cloud
Running IBM MQ in the CloudRobert Parker
 
Running IBM MQ in Containers
Running IBM MQ in ContainersRunning IBM MQ in Containers
Running IBM MQ in ContainersRobert Parker
 
What's new in IBM MQ
What's new in IBM MQWhat's new in IBM MQ
What's new in IBM MQRobert Parker
 
IBM MQ in Containers - Think 2018
IBM MQ in Containers - Think 2018IBM MQ in Containers - Think 2018
IBM MQ in Containers - Think 2018Robert Parker
 
IBM MQ Security Overview MQTC 2017
IBM MQ Security Overview MQTC 2017IBM MQ Security Overview MQTC 2017
IBM MQ Security Overview MQTC 2017Robert Parker
 
IBM MQ in containers MQTC 2017
IBM MQ in containers MQTC 2017IBM MQ in containers MQTC 2017
IBM MQ in containers MQTC 2017Robert Parker
 
Planning for MQ in the cloud MQTC 2017
Planning for MQ in the cloud MQTC 2017Planning for MQ in the cloud MQTC 2017
Planning for MQ in the cloud MQTC 2017Robert Parker
 
IBM MQ security deep dive including AMS MQTC 2017
IBM MQ security deep dive including AMS MQTC 2017IBM MQ security deep dive including AMS MQTC 2017
IBM MQ security deep dive including AMS MQTC 2017Robert Parker
 
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...Robert Parker
 
Interconnect 2017: 6885 Deploying IBM MQ in the cloud
Interconnect 2017: 6885 Deploying IBM MQ in the cloudInterconnect 2017: 6885 Deploying IBM MQ in the cloud
Interconnect 2017: 6885 Deploying IBM MQ in the cloudRobert Parker
 
MQTC 2016: Monitoring and Tracking MQ and Applications
MQTC 2016: Monitoring and Tracking MQ and ApplicationsMQTC 2016: Monitoring and Tracking MQ and Applications
MQTC 2016: Monitoring and Tracking MQ and ApplicationsRobert Parker
 

Mehr von Robert Parker (20)

Simplifying IBM MQ Security in your MQ estate
Simplifying IBM MQ Security in your MQ estateSimplifying IBM MQ Security in your MQ estate
Simplifying IBM MQ Security in your MQ estate
 
IBM MQ Token Authentication.pdf
IBM MQ Token Authentication.pdfIBM MQ Token Authentication.pdf
IBM MQ Token Authentication.pdf
 
IBM MQ Whats new - up to 9.3.4.pdf
IBM MQ Whats new - up to 9.3.4.pdfIBM MQ Whats new - up to 9.3.4.pdf
IBM MQ Whats new - up to 9.3.4.pdf
 
M08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryptionM08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryption
 
MQ Guide France - IBM MQ and Containers
MQ Guide France - IBM MQ and ContainersMQ Guide France - IBM MQ and Containers
MQ Guide France - IBM MQ and Containers
 
MQ Guide France - What's new in ibm mq 9.1.4
MQ Guide France - What's new in ibm mq 9.1.4MQ Guide France - What's new in ibm mq 9.1.4
MQ Guide France - What's new in ibm mq 9.1.4
 
M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019
 
M10: How to implement mq in a containerized architecture ITC 2019
M10: How to implement mq in a containerized architecture ITC 2019M10: How to implement mq in a containerized architecture ITC 2019
M10: How to implement mq in a containerized architecture ITC 2019
 
M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019
 
Running IBM MQ in the Cloud
Running IBM MQ in the CloudRunning IBM MQ in the Cloud
Running IBM MQ in the Cloud
 
Running IBM MQ in Containers
Running IBM MQ in ContainersRunning IBM MQ in Containers
Running IBM MQ in Containers
 
What's new in IBM MQ
What's new in IBM MQWhat's new in IBM MQ
What's new in IBM MQ
 
IBM MQ in Containers - Think 2018
IBM MQ in Containers - Think 2018IBM MQ in Containers - Think 2018
IBM MQ in Containers - Think 2018
 
IBM MQ Security Overview MQTC 2017
IBM MQ Security Overview MQTC 2017IBM MQ Security Overview MQTC 2017
IBM MQ Security Overview MQTC 2017
 
IBM MQ in containers MQTC 2017
IBM MQ in containers MQTC 2017IBM MQ in containers MQTC 2017
IBM MQ in containers MQTC 2017
 
Planning for MQ in the cloud MQTC 2017
Planning for MQ in the cloud MQTC 2017Planning for MQ in the cloud MQTC 2017
Planning for MQ in the cloud MQTC 2017
 
IBM MQ security deep dive including AMS MQTC 2017
IBM MQ security deep dive including AMS MQTC 2017IBM MQ security deep dive including AMS MQTC 2017
IBM MQ security deep dive including AMS MQTC 2017
 
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
 
Interconnect 2017: 6885 Deploying IBM MQ in the cloud
Interconnect 2017: 6885 Deploying IBM MQ in the cloudInterconnect 2017: 6885 Deploying IBM MQ in the cloud
Interconnect 2017: 6885 Deploying IBM MQ in the cloud
 
MQTC 2016: Monitoring and Tracking MQ and Applications
MQTC 2016: Monitoring and Tracking MQ and ApplicationsMQTC 2016: Monitoring and Tracking MQ and Applications
MQTC 2016: Monitoring and Tracking MQ and Applications
 

Kürzlich hochgeladen

%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benonimasabamasaba
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxAnnaArtyushina1
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...masabamasaba
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...chiefasafspells
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 

Kürzlich hochgeladen (20)

%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 

3429 How to transform your messaging environment to a secure messaging environment.

  • 1. How to transform your messaging environment to a secure messaging environment. Robert Parker – parrobe@uk.ibm.com IBM Hursley – UK
  • 2. Introduction • Aims of this presentation – Step by step of each security feature in MQ – Will take an unsecured Queue Manager and secure it – At the end we will have a secured Queue Manager • Each security feature section will have: – What is it and Why do you use it – Main points of the feature – How to configure it.
  • 3. Available Security Features • Connection Authentication • Authorization • Channel Authentication • SSL/TLS • Security Exits • AMS
  • 4. Security provided on Client to Queue Manager connections Channel Authentication (BLOCKADDR) SSL/TLS Channel Authentication (ADDR/USER/SSL Map) Security Exit Connection Authentication Channel Authentication (BLOCKUSER) Authorization MQRC_NONE MQRC_NOT_AUTHORIZED Or
  • 5. Security provided on Queue Manager to Queue Manager connections Channel Authentication (BLOCKADDR) SSL/TLS Channel Authentication (ADDR/QMGR/SSL Map) Security Exit Authorization MQ Protocol
  • 6. The Example Set-up INTERCONNECT Client.Data.Q Client.Connections • Queue Manager • Channel Type(SVRCONN) • Local Queue • Channel Authentication – Disabled • Connection Authentication – Disabled • MQ Administrator set on Channel MCA • No Security Exit • SSL/TLS not configured • AMS not configured
  • 8. Connection Authentication – What is it? • Authentication is used to force clients to identify themselves. • It is usually used in combination with authorization. • Connection authentication was added as a feature of MQ in version 8. *****
  • 9. Connection Authentication – Main Points • MQ allows you to specify levels of security for connections – Client and local can be set to different levels – Different client connections can have different levels using Channel Authentication records. • Also allows two different user repositories to check supplied credentials against – Operating system OAM. – LDAP Server *****
  • 10. Connection Authentication – How to configure it CHCK… NONE OPTIONAL REQUIRED REQDADM MQCONNX Application (User4) MQCONNX Application (User2) QMGR INTERCONNECTInter process Communications DEFINE AUTHINFO(USE.PW) AUTHTYPE(xxxxxx) CHCKLOCL(OPTIONAL) CHCKCLNT(REQUIRED) ADOPTCTX(NO) ALTER QMGR CONNAUTH(USE.PW) REFRESH SECURITY TYPE(CONNAUTH) MQRC_NOT_AUTHORIZED (2035) MQRC_NONE (0) User Repository Application (User4)
  • 11. Connection Authentication – How to configure it DEFINE AUTHINFO(USE.OS) AUTHTYPE(IDPWOS) DEFINE AUTHINFO(USE.LDAP) AUTHTYPE(IDPWLDAP) CONNAME(‘ldap1(389),ldap2(389)’) LDAPUSER(‘CN=QMGR1’) LDAPPWD(‘passw0rd’) SECCOMM(YES) MQCONNX User1 + pwd1 Application (User2) QMGR INTERCONNECT O/S User Repository (z/OS + Dist) LDAP Server (Dist only)
  • 12. Connection Authentication – How to configure it DEFINE AUTHINFO(USE.PW) AUTHTYPE(xxxxxx) CHCKCLNT(OPTIONAL) SET CHLAUTH(‘*’) TYPE(ADDRESSMAP) ADDRESS(‘*’) USERSRC(CHANNEL) CHCKCLNT(REQUIRED) ADOPTCTX(NO) SET CHLAUTH(‘*’) TYPE(SSLPEERMAP) SSLPEER(‘CN=*’) USERSRC(CHANNEL) CHCKCLNT(ASQMGR) CHCKCLNT ASQMGR REQUIRED REQDADM QMgr User's Digital Certificate CA Sig MQCONNX User1 + pwd1 Application (User2) MQRC_NONE (0) SSL/TLS Network Communications MQCONNX User3 + pwd3 Application (User4) MQRC_NOT_AUTHORIZED (2035)
  • 13. Connection Authentication – How to configure it MQCNO cno = {MQCNO_DEFAULT}; cno.Version = MQCNO_VERSION_5; cno.SecurityParmsPtr = &csp; MQCONNX(QMName, &cno, &hConn, &CompCode, &Reason); MQCSP csp = {MQCSP_DEFAULT}; csp.AuthenticationType = MQCSP_AUTH_USER_ID_AND_PWD; csp.CSPUserIdPtr = "hughson"; csp.CSPUserIdLength = 7; /* Max: MQ_CLIENT_USER_ID_LENGTH */ csp.CSPPasswordPtr = "passw0rd"; csp.CSPPasswordLength = 8; /* Max: MQ_CSP_PASSWORD_LENGTH */ • Procedural MQI changes: • MQCSP structure – Connection Security Parameters – User ID and password • MQCNO structure – Connection Options
  • 14. Connection Authentication – How to configure it • Object Oriented MQ classes changes • JMS/XMS classes changes MQEnvironment.properties = new Hashtable(); MQEnvironment.userID = "hughson"; MQEnvironment.password ="passw0rd"; System.out.println("Connecting to queue manager"); MQQueueManager qMgr = new MQQueueManager(QMName); cf = getCF(); System.out.println("Creating the Connection with UID and Password"); Connection conn = cf.createConnection("hughson", "passw0rd");
  • 16. Authorization – What is it? • Authorization is used to limit what connected applications can do. • Authority can be given on a per group basis – Windows allows per user • Authority to perform an action is given. – By default a user/group will not have any authority • Best practice is to only grant minimum required authority
  • 17. Authorization – Main points • Each object in MQ can have separate authorities for each user/group – Additionally you can also supply a generic object name • MQ supplies 5 tools to view and modify authority records – MQ Explorer • Display, create and alter authority records for all objects – runmqsc • Display, create & Alter Authority records for all objects – setmqaut • Create & Alter authority records for requested objects – dspmqaut • Displays authority records for requested objects – dmpmqaut • Outputs authority records for requested objects, output can be inputted into QMGR. • What user/group is used for the authority check depends on what happens before…
  • 18. Authorization – Main points Method Notes Client machine user ID flowed to server This will be over-ridden by anything else. Rarely do you want to trust an unauthenticated client side user ID. MCAUSER set on SVRCONN channel definition A handy trick to ensure that the client flowed ID is never used is to define the MCAUSER as ‘rubbish’ and then anything that is not set appropriately by one of the next methods cannot connect. MCAUSER set by ADOPTCTX(YES) The queue manager wide setting to adopt the password authenticated user ID as the MCAUSER will over-ride either of the above. MCAUSER set by CHLAUTH rule To allow more granular control of MCAUSER setting, rather than relying on the above queue manager wide setting, you can of course use CHLAUTH rules MCAUSER set by Security Exit Although CHLAUTH gets the final say on whether a connection is blocked (security exit not called in that case), the security exit does get called with the MCAUSER CHLAUTH has decided upon, and can change it.
  • 19. Authorization – How to configure it • Example 1: Granting clients the ability to read to the Queue – Here we will give the group “readers” authority to connect – In a command prompt • Queue Manager to create authority record for • Object type you are creating authority record for • Group to give authority to • Authorities – + will grant authority – - will remove authority Setmqaut –m INTERCONNECT –t qmgr –g readers +connect
  • 20. Authorization – How to configure it • Example 1: Granting clients the ability to read to the Queue – Here we will give the group “readers” GET and BROWSE authority – In runmqsc. • Object to grant authorities for • Object type • Group to grant authority • Authority to add SET AUTHREC PROFILE(CLIENT.DATA.Q) OBJTYPE(QUEUE) + GROUP(‘readers’) AUTHADD(GET) AUTHADD(BROWSE)
  • 22. Channel Authentication – What is it? • Allows Granular control over connections – Can Supply a whitelist or blacklist to block or allow connections • Can filter on: – SSL distinguished name (both issuer and subject) – Client user ID – Remote Queue Manager name – IP/Hostname • Blocking at channel (ADDRESSMAP) or listener (BLOCKADDR) level • Values used in filters can be specific or generic
  • 23. Channel Authentication – Main Points • Specific rules have higher precedence than generic rules – 1) Addressmap blocking ‘*’ 2) Addressmap allowing ‘127.0.0.1’ – Any connections from 127.0.0.1 will be allowed by (2). – Other connections blocked by (1) • When creating Channel Authentication rule you can set it to use a different User ID for future Authority checks: 1. NOACCESS – Blocks the connection regardless 2. CHANNEL – Use the User ID specified in Channel MCA • If this is blank then we use the userid supplied by application 3. MAP – Use the User ID specified in this rule.
  • 24. Channel Authentication – How to configure it. • Example 1: Blacklisting bad connections – Aim: Block connections from 129.1.198.X • In Rumqsc: • Channel name • Rule type • Address to match to • Action • Warn SET CHLAUTH(‘CLIENT.CONNECTIONS’) TYPE(ADDRESSMAP) + ADDRESS(‘129.1.198.*’) USERSRC(NOACCESS) WARN(NO)
  • 25. Channel Authentication – How to configure it. • Example 2: Whitelisting good connections – Aim: Block connections all connections except from 129.198.1.7 • In Rumqsc: SET CHLAUTH(‘CLIENT.CONNECTIONS’) TYPE(ADDRESSMAP) + ADDRESS(‘*’) USERSRC(NOACCESS) WARN(NO) SET CHLAUTH(‘CLIENT.CONNECTIONS’) TYPE(ADDRESSMAP) + ADDRESS(‘129.198.1.7’) USERSRC(CHANNEL)
  • 26. Channel Authentication – How to configure it. • In MQ Explorer:
  • 28. SSL/TLS – What is it? • SSL/TLS is used for two reasons in MQ: – Authentication with a Queue Manager – Encrypting and protecting data in transit between a client or Queue Manager and destination Queue Manager. • Uses a certificate containing a public-private key pair in order to establish a secure link. – Called an SSL Handshake. • During the SSL Handshake, asymmetric encryption is used. – Once the handshake is completed symmetric encryption is used to transfer data.
  • 29. SSL/TLS – Main Points • Channels are enabled for SSL/TLS by setting a CipherSpec. – Only one CipherSpec can be used on a channel. • A server Queue Manager must have a certificate • A client application (or client Queue Manager) does not require a certificate. – But does require a copy of the server Queue Manager’s public certificate. • As of MQ v8 a channel can use a different certificate than the Queue Manager it is defined on.
  • 30. SSL/TLS – Main Points • MQ Supplies 3 tools for your certificate and key repository management needs: – strmqikm (or IBM Key Management) • IBM JRE GUI tool for managing certificates – runmqckm • command line tool to manage certificates – can handle JKCS repositories – runmqakm • Command line tool to manage certificates – can handle Elliptic Curve certificates • Default location for Queue Manager Key Repository is – <MQ Data Root>/qmgrs/<QM Name>/ssl/key.kdb • Can be changed using Queue Manager SSLKEYR attribute • Default certificate used by the Queue Manager is – Ibmwebspheremq<qmname> • Can be changed in MQ v8+ using Queue Manager CERTLABL attribute
  • 31. SSL/TLS – How to configure it • Example 1: Setting up a Queue Manager to use SSL/TLS • First create the Key Repository the Queue Manager will use: – In a command prompt: • What we are altering • Action to perform • Name and location of key repository to create • Password to access the key repository • Tells runmqakm to stash the password which is used by MQ. runmqakm –keydb –create –db /var/mqm/qmgrs/INTERCONNECT/ssl/key.kdb –pw passw0rd -stash
  • 32. SSL/TLS – How to configure it • Example 1: Setting up a Queue Manager to use SSL/TLS • Next create the Queue Manager’s certificate – In a command prompt • What we are altering • The action to perform • Where to store the certificate • Tells runmqakm to use the stash file to access the key repository • The distinguished name to give the certificate • The label to refer to the certificate runmqakm –cert –create –db /var/mqm/qmgrs/INTERCONNECT/ssl/key.kdb –stashed –dn “CN=INTERCONNECT,OU=MQ,O=IBM,C=UK” –label ibmwebspheremqinterconnect
  • 33. SSL/TLS – How to configure it • Example 1: Setting up a Queue Manager to use SSL/TLS • Next set the Queue Manager to use Key Repository – Unless you are using defaults – In runmqsc • Location of the key repository to use – No file extension! • Label of certificate to use ALTER QMGR SSLKEYR(‘/var/mqm/qmgrs/INTERCONNECT/ssl/key’) + CERTLABL(‘ibmwebspheremqinterconnect’)
  • 34. SSL/TLS – How to configure it • Example 1: Setting up a Queue Manager to use SSL/TLS • Finally set a channel to use SSL – In runmqsc • Channel name • Whether to use mutual authentication • The CipherSpec to use on this channel ALTER CHANNEL(‘CLIENT.CONNECTIONS’) SSLCAUTH(REQUIRED) + SSLCIPH(TLS_RSA_WITH_AES_128_CBC_SHA256)
  • 35. SSL/TLS – How to configure it • Example 1: Client application changes • MQSCO structure – SSL Security Parameters – Location of Key Repository – Certificate label to use (MQ v8 Only) • MQCNO structure – Connection Options MQCNO cno = {MQCNO_DEFAULT}; cno.Version = MQCNO_VERSION_4; cno.SSLConfigPtr = &sco; MQCONNX(QMName, &cno, &hConn, &CompCode, &Reason); MQSCO sco = {MQSCO_DEFAULT}; sco.version = MQSCO_VERSION_5 sco.KeyRepository = “/var/client/clientkeyr”; Sco.CertificateLabel = “clientcertificate”
  • 36. SSL/TLS – How to configure it • Example 1: Client application • Alternatively if you cannot adjust your application – In command prompt EXPORT MQSSLKEYR=var/client/clientkeyr EXPORT MQCERTLABL=clientcertificate
  • 37. SSL/TLS – How to configure it • Example 1: Client application – Ensure the certificate trust chain is complete on each side ibmwebspheremqinterconnect Queue Manager KeystoreClient Keystore runmqakm –cert –extract –db /var/mqm/qmgrs/INTERCONNECT/ssl/key.kdb –stashed –label ibmwebspheremqinterconnect –file /var/certs/qmgr.cer Qmgr.cer
  • 38. SSL/TLS – How to configure it • Example 1: Client application – Ensure the certificate trust chain is complete on each side ibmwebspheremqinterconnect Queue Manager KeystoreClient Keystore runmqakm –cert –add –db /var/client/clientkeyr.kdb –stashed –label qmgrsignercert –file /var/certs/qmgr.cer Qmgr.cerqmgrsignercert
  • 39. SSL/TLS – How to configure it • Example 1: Client application (Mutual Authentication) – Ensure the certificate trust chain is complete on each side ibmwebspheremqinterconnect Queue Manager KeystoreClient Keystore client.cerqmgrsignercert clientcertificate clientsignercert runmqakm –cert –extract –db /var/client/clientkeyr.kdb –stashed –label clientcertificate –file /var/certs/client.cer runmqakm –cert –add –db /var/mqm/qmgrs/INTERCONNECT/ssl/key.kdb –stashed –label clientsignercert –file /var/certs/client.cer
  • 41. Security Exits – What is it? • Security exits are bespoke, customer created exists that are ran during the security checks. • MQ contains an API used in the security exits to extract information about an incoming connection. – This information can then be used in the security exit to determine whether to allow or disallow a connection. • Prior to MQ v8 a security exit was used in MVS to supply connection authentication capabilities – CSQ4BCX3
  • 42. Security Exits – Main Points • Security exits are stored in <MQ Data Root>/exits/<Installation name> – MQ will look in this folder when an exit is attached to a channel • Exits are referenced in SCYEXIT channel attribute – Without the file suffix or location • As well as security exits there are also: – Receive exits – RCVEXIT – Send exits – SENDEXIT • For each exit you can also supply custom data to pass to the exit using the channel’s ***DATA attribute – For example Security exit data using SCYDATA
  • 43. Security Exits – How to Configure it • First write a C Application with the following skeleton code: void MQENTRY MQStart() {;} void MQENTRY EntryPoint (PMQVOID pChannelExitParms, PMQVOID pChannelDefinition, PMQLONG pDataLength, PMQLONG pAgentBufferLength, PMQVOID pAgentBuffer, PMQLONG pExitBufferLength, PMQPTR pExitBufferAddr) { PMQCXP pParms = (PMQCXP)pChannelExitParms; PMQCD pChDef = (PMQCD)pChannelDefinition; /* TODO: Add Security Exit Code Here */ }
  • 44. Security Exits – How to Configure it • Next compile and link the exit as a Dynamic library and place in: – <MQ Data Root>/exits/<Installation name>
  • 45. Security Exits – How to Configure it • Next specify the exit on the channel: – In runmqsc • Channel name • Name of security exit to run – Without location or file extension • Custom data to pass to the security exit ALTER CHANNEL(‘CLIENT.CONNECTIONS’) SCYEXIT(‘mqccred’) + SCYDATA(‘sec exit data’)
  • 47. AMS – What is it? • AMS provides a higher level of protection to messages • Has two levels of protection - policies – Integrity protection • Prevents messages from being tampered with. • Guarantees message has been received from known source – Integrity and privacy protection • Same benefits as Integrity protection • Also provides encryption to prevent unauthorised recipients seeing message • AMS does not perform access control but simply provides privacy and integrity to messages. • Messages are protected using certificates that each signer and recipient will need. – Depending on level of protection !*54% @”p
  • 48. AMS – Main points • It is an end-to-end security model – Messages are protected from creation until destruction • Messages can be protected so that only authorised users can see message data – This means even MQ Administrators cannot view a message. • Messages are protected both in transit and at rest – Satisfies the standards compliance for certain data types (HIPAA, PCI, etc) • AMS is incorporated into MQ Client applications without the need for re-building applications – No code changes are necessary! • Message size will increase in order to incorporate AMS format – New message size = 1280 + [Old Message Length] + (200 x [# of recipients]) !*54% @”p
  • 49. AMS – Main points • Unlike SSL, it requires the FULL trust chain – Subject certificate, signer certificate, signer’s signer certificate, etc • MQ has three tools for defining and managing policies – MQ Explorer • Define, display, delete policies – setmqspl • define, delete policies – dspmqspl • Display policies !*54% @”p
  • 50. AMS – How to configure it • Example 1: Configuring MQ to protect messages – In a command prompt: • Queue Manager • Queue to protect • Signing algorithm • Authorised signer(s) • Encryption algorithm • Authorised recipient(s) !*54% @”p setmqspl -m INTERCONNECT -p CLIENT.DATA.Q -s SHA512 -a "CN=CLIENT1,O=CLIENTORG,C=UK" -e AES256 -r "CN=CLIENT2,O=CLIENTORG,C=UK"
  • 51. AMS – How to configure it • Example 1: Application changes !*54% @”p Alice’s Sending/Receiving App AliceCertificate MQS_KEYSTORE_CONF=/…/Keystore.conf (Or create Keystore.conf in home directory) No Changes Necessary! Keystore.conf cms.keystore=/…/Keystore cms.certificate=AliceCertificate Keystore
  • 52. Notices and Disclaimers Copyright © 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law. 52
  • 53. Notices and Disclaimers (con’t) Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. •IBM, the IBM logo, ibm.com, Bluemix, Blueworks Live, CICS, Clearcase, DOORS®, Enterprise Document Management System™, Global Business Services ®, Global Technology Services ®, Information on Demand, ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®, PureData®, PureExperience®, PureFlex®, pureQuery®, pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, SoDA, SPSS, StoredIQ, Tivoli®, Trusteer®, urban{code}®, Watson, WebSphere®, Worklight®, X- Force® and System z® Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.
  • 54. Where can I get more information? IBM Messaging developerWorks developer.ibm.com/messaging IBM Messaging Youtube https://www.youtube.com/IBMmessagingMedia LinkedIn Ibm.biz/ibmmessaging Twitter @IBMMessaging IBM MQ Facebook Facebook.com/IBM-MQ-8304628654/