SlideShare ist ein Scribd-Unternehmen logo
1 von 65
IBM Cloud Technical University 2016
25 – 28 October 2016|Madrid, Spain
I173
How to Transform Your Messaging
Environment to a Secure
Messaging Environment
Rob Parker, MQ Ecosystem
2
• IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without
notice at IBM’s sole discretion.
• Information regarding potential future products is intended to outline our general product direction and it
should not be relied on in making a purchasing decision.
• The information mentioned regarding potential future products is not a commitment, promise, or legal
obligation to deliver any material, code or functionality. Information about potential future products may not
be incorporated into any contract.
• The development, release, and timing of any future features or functionality described for our products
remains at our sole discretion.
• Performance is based on measurements and projections using standard IBM benchmarks in a controlled
environment. The actual throughput or performance that any user will experience will vary depending upon
many factors, including considerations such as the amount of multiprogramming in the user’s job stream,
the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can
be given that an individual user will achieve results similar to those stated here.
Please Note:
Š 2016 IBM Corporation 3
Agenda
• Aims of this presentation
 Step by step of each security feature in MQ
 Will take an unsecured Queue Manager and
secure it
 At the end we will have a secured Queue
Manager
• Each security feature section will have:
 What is it and Why do you use it
 Main points of the feature
 How to configure it.
Š 2016 IBM Corporation 4
Available Security Features
• Connection Authentication
• Authorisation
• Channel Authentication
• Transport Layer Security (TLS)
• Security Exits
• AMS
Š 2016 IBM Corporation 5
Client to Queue Manager connections (Net)
Channel Authentication
(BLOCKADDR)
TLS
Channel Authentication
(ADDR/USER/SSL Map)
Security Exit
Connection
Authentication
Channel Authentication
(BLOCKUSER)
Authorisation
MQRC_NONE
MQRC_NOT_AUTHORIZED
Or
Š 2016 IBM Corporation 6
Client to Queue Manager connections (Local)
Channel Authentication
(BLOCKADDR)
TLS
Channel Authentication
(ADDR/USER/SSL Map)
Security Exit
Connection
Authentication
Channel Authentication
(BLOCKUSER)
Authorisation
Š 2016 IBM Corporation 7
Queue Manager to Queue Manager
Channel Authentication
(BLOCKADDR)
TLS
Channel Authentication
(ADDR/QMName/SSL Map)
Security Exit
Authorisation
Š 2016 IBM Corporation 8
Working example
• Queue Manager
• Channel Type(SVRCONN)
• Local Queue
• Channel Authentication – Disabled
• Connection Authentication – Disabled
• MQ Administrator set on Channel MCA
• No Security Exit
• TLS not configured
• AMS not configured
CTU
Client.Data.Q
Client.Connections
IBM Cloud Technical University 2016
25 – 28 October 2016|Madrid, Spain
Connection Authentication
Š 2016 IBM Corporation 10
Introduction
• Authentication is used to force clients to identify
themselves.
• It is usually used in combination with authorisation.
• Connection authentication was added as a feature of
MQ in version 8.
*****
Š 2016 IBM Corporation 11
Main features
• MQ allows you to specify levels of security for
connections
 Client and local can be set to different levels
 Different client connections can have different
levels using Channel Authentication records.
• Also allows two different user repositories to check
supplied credentials against
 Operating system OAM.
 LDAP Server
*****
Š 2016 IBM Corporation 12
Configuration
DEFINE AUTHINFO(USE.OS) AUTHTYPE(IDPWOS)
DEFINE AUTHINFO(USE.LDAP) AUTHTYPE(IDPWLDAP)
CONNAME(‘ldap1(389),ldap2(389)’)
LDAPUSER(‘CN=QMGR1’)
LDAPPWD(‘passw0rd’) SECCOMM(YES)
MQCONNX
User1 + pwd1
Application (User2)
QMGR
CTU
O/S User
Repository
(z/OS + Dist)
LDAP Server (Dist only)
Š 2016 IBM Corporation 13
Configuration
CHCK…
NONE
OPTIONAL
REQUIRED
REQDADM
MQCONNX
MQCONNX
Application (User2)
QMGR
CTUInter process
Communications
DEFINE AUTHINFO(USE.PW) AUTHTYPE(xxxxxx)
CHCKLOCL(OPTIONAL)
CHCKCLNT(REQUIRED)
ADOPTCTX(NO)
ALTER QMGR CONNAUTH(USE.PW)
REFRESH SECURITY TYPE(CONNAUTH)
MQRC_NOT_AUTHORIZED (2035)
MQRC_NONE (0)
User
Repository
Application (User4)
Š 2016 IBM Corporation 14
Configuration
DEFINE AUTHINFO(USE.PW) AUTHTYPE(xxxxxx)
CHCKCLNT(OPTIONAL)
SET CHLAUTH(‘*’) TYPE(ADDRESSMAP)
ADDRESS(‘*’) USERSRC(CHANNEL)
CHCKCLNT(REQUIRED)
ADOPTCTX(NO)
SET CHLAUTH(‘*’) TYPE(SSLPEERMAP)
SSLPEER(‘CN=*’) USERSRC(CHANNEL)
CHCKCLNT(ASQMGR)
CHCKCLNT
ASQMGR
REQUIRED
REQDADM
QMGR
CTU
User's Digital
Certificate
CA
Sig
MQCONNX
Application (User2)
MQRC_NONE (0)
SSL/TLS Network
Communications
MQCONNX
Application (User4)
MQRC_NOT_AUTHORIZED (2035)
Š 2016 IBM Corporation 15
Configuration
• Procedural MQI changes:
• MQCSP structure
 Connection Security Parameters
 User ID and password
• MQCNO structure
 Connection Options
MQCNO cno = {MQCNO_DEFAULT};
cno.Version = MQCNO_VERSION_5;
cno.SecurityParmsPtr = &csp;
MQCONNX(QMName,
&cno,
&hConn,
&CompCode,
&Reason);
MQCSP csp = {MQCSP_DEFAULT};
csp.AuthenticationType = MQCSP_AUTH_USER_ID_AND_PWD;
csp.CSPUserIdPtr = “parrobe";
csp.CSPUserIdLength = 7; /* Max: MQ_CLIENT_USER_ID_LENGTH */
csp.CSPPasswordPtr = "passw0rd";
csp.CSPPasswordLength = 8; /* Max: MQ_CSP_PASSWORD_LENGTH */
Š 2016 IBM Corporation 16
Configuration
• Object Oriented MQ classes changes
• JMS/XMS classes changes
MQEnvironment.properties = new Hashtable();
MQEnvironment.userID = “parrobe";
MQEnvironment.password ="passw0rd";
System.out.println("Connecting to queue manager");
MQQueueManager qMgr = new MQQueueManager(QMName);
cf = getCF();
System.out.println("Creating the Connection with UID and Password");
Connection conn = cf.createConnection(“parrobe", "passw0rd");
IBM Cloud Technical University 2016
25 – 28 October 2016|Madrid, Spain
Authorisation
Š 2016 IBM Corporation 18
Introduction
• Authorisation is used to limit what connected
applications can do.
• Authority can be given on a per group basis
 Windows allows per user by default
 Linux can do per user with configuration
• Authority to perform an action is given.
 By default a user/group will not have any authority
• Best practice is to only grant minimum required
authority
Š 2016 IBM Corporation 19
Features
• Each object in MQ can have separate authorities for
each user/group
 Additionally you can also supply a generic object
name
• MQ supplies 5 tools to view and modify authority
records
 MQ Explorer
⁝ Display, create and alter authority records for all
objects
Š 2016 IBM Corporation 20
Tools (continued)
 runmqsc
⁝ Display, create & Alter Authority records for all
objects
 setmqaut
⁝ Create & Alter authority records for requested
objects
 dspmqaut
⁝ Displays authority records for requested objects
 dmpmqaut
⁝ Outputs authority records for requested objects,
output can be inputted into QMGR.
Š 2016 IBM Corporation 21
Which user is used for authorization?
Method Notes
Client machine user ID flowed to
server
This will be over-ridden by anything else. Rarely do you
want to trust an unauthenticated client side user ID.
MCAUSER set on SVRCONN
channel definition
A handy trick to ensure that the client flowed ID is never
used is to define the MCAUSER as ‘rubbish’ and then
anything that is not set appropriately by one of the next
methods cannot connect.
MCAUSER set by
ADOPTCTX(YES)
The queue manager wide setting to adopt the password
authenticated user ID as the MCAUSER will over-ride
either of the above.
MCAUSER set by CHLAUTH rule To allow more granular control of MCAUSER setting,
rather than relying on the above queue manager wide
setting, you can of course use CHLAUTH rules
MCAUSER set by Security Exit Although CHLAUTH gets the final say on whether a
connection is blocked (security exit not called in that
case), the security exit does get called with the
MCAUSER CHLAUTH has decided upon, and can change
it.
Š 2016 IBM Corporation 22
Configuration
• Example 1: Granting clients the ability to read to the
Queue
 Here we will give the group “readers” authority to
connect
 In a command prompt
• Queue Manager to create authority record for
• Object type you are creating authority record for
• Group to give authority to
• Authorities
Setmqaut –m CTU –t qmgr –g readers +connect
Š 2016 IBM Corporation 23
Configuration
• Example 1: Granting clients the ability to read to the
Queue
 Here we will give the group “readers” GET and
BROWSE authority
 In runmqsc.
• Object to grant authorities for
• Object type
• Group to grant authority
• Authority to add
SET AUTHREC PROFILE(CLIENT.DATA.Q) OBJTYPE(QUEUE) +
GROUP(‘readers’) AUTHADD(GET) AUTHADD(BROWSE)
IBM Cloud Technical University 2016
25 – 28 October 2016|Madrid, Spain
Channel Authentication Records
Š 2016 IBM Corporation 25
Introduction
• Allows Granular control over connections
 Can Supply a whitelist or blacklist to block or allow
connections
• Can filter on:
 SSL distinguished name (both issuer and subject)
 Client user ID (Application or final adopted)
 Remote Queue Manager name
 IP/Hostname
 Blocking at channel (ADDRESSMAP) or listener
(BLOCKADDR) level
Š 2016 IBM Corporation 26
Features
• Values used in filters can be specific or generic
• Specific rules have higher precedence than generic
rules
1. Addressmap blocking ‘*’
2. Addressmap allowing ‘127.0.0.1’
 Any connections from 127.0.0.1 will be allowed by
(2).
 Other connections blocked by (1)
Š 2016 IBM Corporation 27
Features
• When creating Channel Authentication rule you can set
it to use a different User ID for future authority checks:
 NOACCESS – Blocks the connection regardless
 CHANNEL – Use the User ID specified in Channel
MCA
⁝ If this is blank then we use the userid supplied
by application
 MAP – Use the User ID specified in this rule.
Š 2016 IBM Corporation 28
Configuration
• Example 1: Blacklisting bad connections
 Aim: Block connections from 129.1.198.X
• In Rumqsc:
• Channel name
• Rule type
• Address to match to
• Action
• Warn
SET CHLAUTH(‘CLIENT.CONNECTIONS’) TYPE(ADDRESSMAP) +
ADDRESS(‘129.1.198.*’) USERSRC(NOACCESS) WARN(NO)
Š 2016 IBM Corporation 29
Configuration
• In MQ Explorer:
IBM Cloud Technical University 2016
25 – 28 October 2016|Madrid, Spain
Transport Layer Security
Š 2016 IBM Corporation 31
Introduction
• TLS is used for two reasons in MQ:
 Authentication with a Queue Manager
 Encrypting and protecting data in transit between a
client or Queue Manager and destination Queue
Manager.
• Uses a certificate containing a public-private key pair in
order to establish a secure link.
 Called an SSL Handshake.
Š 2016 IBM Corporation 32
Features
• During the SSL Handshake, asymmetric encryption is
used.
 Once the handshake is completed symmetric
encryption is used to transfer data.
• Channels are enabled for SSL/TLS by setting a
CipherSpec.
 Only one CipherSpec can be used on a channel.
Š 2016 IBM Corporation 33
Features
• A server Queue Manager must have a certificate
• A client application (or client Queue Manager) does
not require a certificate.
 But does require a copy of the server Queue
Manager’s public certificate.
• As of MQ v8 a channel can use a different certificate
than the Queue Manager it is defined on.
Š 2016 IBM Corporation 34
Tools
• MQ Supplies 3 tools for your certificate and key
repository management needs:
 strmqikm (or IBM Key Management)
⁝ IBM JRE GUI tool for managing certificates
 runmqckm
⁻ command line tool to manage certificates – can
handle JKCS repositories
 runmqakm
⁻ Command line tool to manage certificates – can
handle Elliptic Curve certificates
Š 2016 IBM Corporation 35
Defaults
• Default location for Queue Manager Key Repository is
 <MQ Data Root>/qmgrs/<QM Name>/ssl/key.kdb
⁝ Can be changed using Queue Manager SSLKEYR
attribute
• Default certificate used by the Queue Manager is
 Ibmwebspheremq<qmname>
⁝ Can be changed in MQ v8+ using Queue
Manager CERTLABL attribute
Š 2016 IBM Corporation 36
Configuration
• Example 1: Setting up a Queue Manager to use SSL/TLS
• First create the Key Repository the Queue Manager will
use:
 In a command prompt:
• What we are altering
• Action to perform
• Name and location of key repository to create
• Password to access the key repository
• Tells runmqakm to stash the password which is used by
MQ.
runmqakm –keydb –create –db /var/mqm/qmgrs/CTU/ssl/key.kdb
–pw passw0rd -stash
Š 2016 IBM Corporation 37
Configuration
• Example 1: Setting up a Queue Manager to use SSL/TLS
• Next create the Queue Manager’s certificate
• In a command prompt:
• What we are altering
• The action to perform
• Where to store the certificate
• Tells runmqakm to use the stash file to access the key repository
• The distinguished name to give the certificate
• The label to refer to the certificate
runmqakm –cert –create –db /var/mqm/qmgrs/CTU/ssl/key.kdb
–stashed –dn “CN=CTU,OU=MQ,O=IBM,C=UK” –label ibmwebspheremqctu
Š 2016 IBM Corporation 38
Configuration
• Example 1: Setting up a Queue Manager to use SSL/TLS
• Next set the Queue Manager to use Key Repository
 Unless you are using defaults
 In runmqsc
• Location of the key repository to use
 No file extension!
• Label of certificate to use
ALTER QMGR SSLKEYR(‘/var/mqm/qmgrs/CTU/ssl/key’) +
CERTLABL(‘ibmwebspheremqctu’)
Š 2016 IBM Corporation 39
Configuration
• Example 1: Setting up a Queue Manager to use SSL/TLS
• Finally set a channel to use SSL
 In runmqsc
• Channel name
• Whether to enforce mutual authentication
• The CipherSpec to use on this channel
ALTER CHANNEL(‘CLIENT.CONNECTIONS’) SSLCAUTH(REQUIRED) +
SSLCIPH(TLS_RSA_WITH_AES_128_CBC_SHA256)
Š 2016 IBM Corporation 40
Configuration
• Example 1: Client application changes
• MQSCO structure
• SSL Security Parameters
• Location of Key Repository
• Certificate label to use (MQ v8 Only)
• MQCNO structure
• Connection Options
MQSCO sco = {MQSCO_DEFAULT};
sco.version = MQSCO_VERSION_5
sco.KeyRepository = “/var/client/clientkeyr”;
Sco.CertificateLabel = “clientcertificate”
MQCNO cno = {MQCNO_DEFAULT};
cno.Version = MQCNO_VERSION_4;
cno.SSLConfigPtr = &sco;
MQCONNX(QMName,
&cno,
&hConn,
&CompCode,
&Reason);
Š 2016 IBM Corporation 41
Configuration
• Example 1: Client application
• Alternatively, if you cannot adjust your application
 In command prompt
EXPORT MQSSLKEYR=var/client/clientkeyr
EXPORT MQCERTLABL=clientcertificate
Š 2016 IBM Corporation 42
Configuration
• Example 1: Client application
 Ensure the certificate trust chain is complete on
each side
ibmwebspheremqctu
Queue Manager KeystoreClient Keystore
runmqakm –cert –extract –db /var/mqm/qmgrs/CTU/ssl/key.kdb
–stashed –label ibmwebspheremqctu –file /var/certs/qmgr.cer
Qmgr.cer
Š 2016 IBM Corporation 43
Configuration
• Example 1: Client application
 Ensure the certificate trust chain is complete on
each side
ibmwebspheremqctu
Queue Manager KeystoreClient Keystore
Qmgr.cer
runmqakm –cert –add –db /var/client/clientkeyr.kdb –stashed
–label qmgrsignercert –file /var/certs/qmgr.cer
qmgrsignercert
Š 2016 IBM Corporation 44
Configuration
• Example 1: Client application (Mutual Authentication)
 Ensure the certificate trust chain is complete on
each side
ibmwebspheremqctu
Queue Manager KeystoreClient Keystore
client.cerqmgrsignercert
clientcertificate
clientsignercert
runmqakm –cert –extract –db /var/client/clientkeyr.kdb
–stashed –label clientcertificate –file
/var/certs/client.cer
runmqakm –cert –add –db /var/mqm/qmgrs/CTU/ssl/key.kdb
–stashed –label clientsignercert –file /var/certs/client.cer
IBM Cloud Technical University 2016
25 – 28 October 2016|Madrid, Spain
Security Exits
Š 2016 IBM Corporation 46
Introduction
• Security exits are bespoke, customer created exists that
are ran during the security checks.
• MQ contains an API used in the security exits to extract
information about an incoming connection.
 This information can then be used in the security
exit to determine whether to allow or disallow a
connection.
• Prior to MQ v8 a security exit was used in MVS to
supply connection authentication capabilities
 CSQ4BCX3
Š 2016 IBM Corporation 47
Features
• Security exits are stored in
 <MQ Data Root>/exits/<Installation name>
• MQ will look in this folder when an exit is attached to a
channel
• Exits are referenced in SCYEXIT channel attribute
 Without the file suffix or location
Š 2016 IBM Corporation 48
Features
• As well as security exits there are also:
 Receive exits – RCVEXIT
 Send exits – SENDEXIT
• For each exit you can also supply custom data to pass
to the exit using the channel’s ***DATA attribute
 For example Security exit data using SCYDATA
Š 2016 IBM Corporation 49
Configuration
• First write a C Application with the following skeleton
code:
void MQENTRY MQStart() {;}
void MQENTRY EntryPoint (PMQVOID pChannelExitParms,
PMQVOID pChannelDefinition,
PMQLONG pDataLength,
PMQLONG pAgentBufferLength,
PMQVOID pAgentBuffer,
PMQLONG pExitBufferLength,
PMQPTR pExitBufferAddr)
{
PMQCXP pParms = (PMQCXP)pChannelExitParms;
PMQCD pChDef = (PMQCD)pChannelDefinition;
/* TODO: Add Security Exit Code Here */
}
Š 2016 IBM Corporation 50
Configuration
• Next compile and link the exit as a Dynamic library and
place in:
 <MQ Data Root>/exits/<Installation name>
Š 2016 IBM Corporation 51
Configuration
• Next specify the exit on the channel:
 In runmqsc
• Channel name
• Name of security exit to run
 Without location or file extension
• Custom data to pass to the security exit
ALTER CHANNEL(‘CLIENT.CONNECTIONS’) SCYEXIT(‘mqccred’) +
SCYDATA(‘sec exit data’)
IBM Cloud Technical University 2016
25 – 28 October 2016|Madrid, Spain
Advanced Messaging Security
Š 2016 IBM Corporation 53
Introduction
• AMS provides a higher level of protection to messages
• Has two levels of protection - policies
 Integrity protection
⁝ Prevents messages from being tampered with.
⁝ Guarantees message has been received from
known source
 Integrity and privacy protection
⁝ Same benefits as Integrity protection
⁝ Also provides encryption to prevent
unauthorised recipients seeing message
!*54%
@”p
Š 2016 IBM Corporation 54
Features
• AMS does not perform access control but simply
provides privacy and integrity to messages.
• Messages are protected using certificates that each
signer and recipient will need.
 Depending on level of protection
!*54%
@”p
Š 2016 IBM Corporation 55
Features
• It is an end-to-end security model
 Messages are protected from creation until
destruction
• Messages can be protected so that only authorised
users can see message data
 This means even MQ Administrators cannot view a
message.
• Messages are protected both in transit and at rest
 Satisfies the standards compliance for certain data
types (HIPAA, PCI, etc)
!*54%
@”p
Š 2016 IBM Corporation 56
Features
• AMS is incorporated into MQ Client applications
without the need for re-building applications
 No code changes are necessary!
• Message size will increase in order to incorporate AMS
format
 New message size = 1280 + [Old Message Length] +
(200 x [# of recipients])
!*54%
@”p
Š 2016 IBM Corporation 57
Tools
• Unlike SSL, it requires the FULL trust chain
 Subject certificate, signer certificate, signer’s signer
certificate, etc
• MQ has three tools for defining and managing policies
 MQ Explorer
⁝ Define, display, delete policies
 setmqspl
⁝ Define, delete policies
 dspmqspl
⁝ Display policies
!*54%
@”p
Š 2016 IBM Corporation 58
Configuration
• Example 1: Configuring MQ to protect messages
 In a command prompt:
• Queue Manager
• Queue to protect
• Signing algorithm
• Authorised signer
• Encryption algorithm
• Authorised recipient
!*54%
@”p
setmqspl -m CTU -p CLIENT.DATA.Q -s SHA512 -a
"CN=CLIENT1,O=CLIENTORG,C=UK" -e AES256 -r
"CN=CLIENT2,O=CLIENTORG,C=UK"
Š 2016 IBM Corporation 59
Configuration
Example 1: Application changes
!*54%
@”p
Alice’s
Sending/Receiving
App
AliceCertificate
MQS_KEYSTORE_CONF=/…/Keystore.conf
(Or create Keystore.conf in home directory)
No Changes Necessary!
Keystore.conf
cms.keystore=/…/Keystore
cms.certificate=AliceCertificate
Keystore
For Additional Information
 IBM Digital Experience Solutions
http://www-01.ibm.com/software/collaboration/digitalexperience
 WebSphere Portal and IBM Web Content Manager Information
Center Wiki
http://www-10.lotus.com/ldd/portalwiki.nsf/
 IBM Digital Experience Demonstrations:
http://www.youtube.com/user/IBMXWebX
• IBM Digital Experience Developer
http://developer.ibm.com/digexp
 IBM Software Business Solutions Catalog
https://greenhouse.lotus.com/catalog/
Where can I get more information about IBM MQ?
IBM Messaging developerWorks
developer.ibm.com/messaging
IBM Messaging Youtube
https://www.youtube.com/IBMmessagingMedia
LinkedIn
Ibm.biz/ibmmessaging
Twitter
@IBMMessaging
IBM MQ Facebook
Facebook.com/IBM-MQ-8304628654/
Rob Parker
Thank you very much.
IBM
IBM MQ Ecosystem
parrobe@uk.ibm.com
Š 2016 IBM Corporation 62
Š 2016 IBM Corporation 63
Your feedback is valuable
Please complete your session or lab evaluation!
Session number I173
Provide your evaluations by:
Evaluation forms:
Fill out a form at the end of each session
Paper forms are located in each of the
session or lab rooms
Complete the session survey on Event
Connect Portal:
ibmeventconnect.com/madrid2016
Select Sessions, then Session Finder, and
complete the survey
- Or -
Notes and Disclaimers
64
Copyright Š 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or
transmitted in any form without written permission from IBM.
U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with
IBM.
Information in these presentations (including information relating to products that have not yet been announced by IBM)
has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or
typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS
IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY
DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA,
BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are
warranted according to the terms and conditions of the agreements under which they are provided.
Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice.
Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are
presented as illustrations of how those customers have used IBM products and the results they may have achieved.
Actual performance, cost, savings or other results in other operating environments may vary.
References in this document to IBM products, programs, or services does not imply that IBM intends to make such
products, programs or services available in all countries in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not
necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are
neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific
situation.
It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent
legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the
customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal
advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law
Notes and Disclaimers
65
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products in connection with this publication
and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions
on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the
quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM
EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM
patents, copyrights, trademarks or other intellectual property right.
IBM, the IBM logo, ibm.com, AsperaÂŽ, Bluemix, Blueworks Live, CICS, Clearcase, CognosÂŽ, DOORSÂŽ, EmptorisÂŽ,
Enterprise Document Management System™, FASP®, FileNet®, Global Business Services ®, Global Technology
Services ®, IBM ExperienceOne™, IBM SmartCloud®, IBM Social Business®, Information on Demand, ILOG, Maximo®,
MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™, PureApplication®, pureCluster™,
PureCoverageÂŽ, PureDataÂŽ, PureExperienceÂŽ, PureFlexÂŽ, pureQueryÂŽ, pureScaleÂŽ, PureSystemsÂŽ, QRadarÂŽ,
RationalÂŽ, RhapsodyÂŽ, Smarter CommerceÂŽ, SoDA, SPSS, Sterling CommerceÂŽ, StoredIQ, TealeafÂŽ, TivoliÂŽ,
TrusteerÂŽ, UnicaÂŽ, urban{code}ÂŽ, Watson, WebSphereÂŽ, WorklightÂŽ, X-ForceÂŽ and System zÂŽ Z/OS, are trademarks of
International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names
might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and
trademark information" at: www.ibm.com/legal/copytrade.shtml.

Weitere ähnliche Inhalte

Was ist angesagt?

M10: How to implement mq in a containerized architecture ITC 2019
M10: How to implement mq in a containerized architecture ITC 2019M10: How to implement mq in a containerized architecture ITC 2019
M10: How to implement mq in a containerized architecture ITC 2019Robert Parker
 
IBM MQ Security Overview MQTC 2017
IBM MQ Security Overview MQTC 2017IBM MQ Security Overview MQTC 2017
IBM MQ Security Overview MQTC 2017Robert Parker
 
IBM MQ in containers MQTC 2017
IBM MQ in containers MQTC 2017IBM MQ in containers MQTC 2017
IBM MQ in containers MQTC 2017Robert Parker
 
M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019Robert Parker
 
IBM Message Hub: Cloud-Native Messaging
IBM Message Hub: Cloud-Native MessagingIBM Message Hub: Cloud-Native Messaging
IBM Message Hub: Cloud-Native MessagingAndrew Schofield
 
Mq light, mq, and bluemix web sphere user group july 2015
Mq light, mq, and bluemix   web sphere user group july 2015Mq light, mq, and bluemix   web sphere user group july 2015
Mq light, mq, and bluemix web sphere user group july 2015matthew1001
 
Running IBM MQ in Containers
Running IBM MQ in ContainersRunning IBM MQ in Containers
Running IBM MQ in ContainersRobert Parker
 
What's new in IBM MQ, March 2018
What's new in IBM MQ, March 2018What's new in IBM MQ, March 2018
What's new in IBM MQ, March 2018David Ware
 
MQ Guide France - IBM MQ and Containers
MQ Guide France - IBM MQ and ContainersMQ Guide France - IBM MQ and Containers
MQ Guide France - IBM MQ and ContainersRobert Parker
 
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...Robert Parker
 
IBM MQ - Monitoring and Managing Hybrid Messaging Environments
IBM MQ - Monitoring and Managing Hybrid Messaging EnvironmentsIBM MQ - Monitoring and Managing Hybrid Messaging Environments
IBM MQ - Monitoring and Managing Hybrid Messaging EnvironmentsMarkTaylorIBM
 
HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...
 HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen... HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...
HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...Matt Leming
 
Running IBM MQ in the Cloud
Running IBM MQ in the CloudRunning IBM MQ in the Cloud
Running IBM MQ in the CloudRobert Parker
 
MQTC 2016: IBM MQ Security deep dive including AMS
MQTC 2016: IBM MQ Security deep dive including AMSMQTC 2016: IBM MQ Security deep dive including AMS
MQTC 2016: IBM MQ Security deep dive including AMSRobert Parker
 
531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ systemRobert Parker
 
Ibm mq appliance slideshare
Ibm mq appliance slideshareIbm mq appliance slideshare
Ibm mq appliance slideshareAnthony Beardsmore
 
IBM MQ on cloud and containers
IBM MQ on cloud and containersIBM MQ on cloud and containers
IBM MQ on cloud and containersRobert Parker
 
HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
 HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ... HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...Matt Leming
 
Where is My Message
Where is My MessageWhere is My Message
Where is My MessageMatt Leming
 
M08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryptionM08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryptionRobert Parker
 

Was ist angesagt? (20)

M10: How to implement mq in a containerized architecture ITC 2019
M10: How to implement mq in a containerized architecture ITC 2019M10: How to implement mq in a containerized architecture ITC 2019
M10: How to implement mq in a containerized architecture ITC 2019
 
IBM MQ Security Overview MQTC 2017
IBM MQ Security Overview MQTC 2017IBM MQ Security Overview MQTC 2017
IBM MQ Security Overview MQTC 2017
 
IBM MQ in containers MQTC 2017
IBM MQ in containers MQTC 2017IBM MQ in containers MQTC 2017
IBM MQ in containers MQTC 2017
 
M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019
 
IBM Message Hub: Cloud-Native Messaging
IBM Message Hub: Cloud-Native MessagingIBM Message Hub: Cloud-Native Messaging
IBM Message Hub: Cloud-Native Messaging
 
Mq light, mq, and bluemix web sphere user group july 2015
Mq light, mq, and bluemix   web sphere user group july 2015Mq light, mq, and bluemix   web sphere user group july 2015
Mq light, mq, and bluemix web sphere user group july 2015
 
Running IBM MQ in Containers
Running IBM MQ in ContainersRunning IBM MQ in Containers
Running IBM MQ in Containers
 
What's new in IBM MQ, March 2018
What's new in IBM MQ, March 2018What's new in IBM MQ, March 2018
What's new in IBM MQ, March 2018
 
MQ Guide France - IBM MQ and Containers
MQ Guide France - IBM MQ and ContainersMQ Guide France - IBM MQ and Containers
MQ Guide France - IBM MQ and Containers
 
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
 
IBM MQ - Monitoring and Managing Hybrid Messaging Environments
IBM MQ - Monitoring and Managing Hybrid Messaging EnvironmentsIBM MQ - Monitoring and Managing Hybrid Messaging Environments
IBM MQ - Monitoring and Managing Hybrid Messaging Environments
 
HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...
 HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen... HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...
HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...
 
Running IBM MQ in the Cloud
Running IBM MQ in the CloudRunning IBM MQ in the Cloud
Running IBM MQ in the Cloud
 
MQTC 2016: IBM MQ Security deep dive including AMS
MQTC 2016: IBM MQ Security deep dive including AMSMQTC 2016: IBM MQ Security deep dive including AMS
MQTC 2016: IBM MQ Security deep dive including AMS
 
531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system
 
Ibm mq appliance slideshare
Ibm mq appliance slideshareIbm mq appliance slideshare
Ibm mq appliance slideshare
 
IBM MQ on cloud and containers
IBM MQ on cloud and containersIBM MQ on cloud and containers
IBM MQ on cloud and containers
 
HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
 HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ... HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
 
Where is My Message
Where is My MessageWhere is My Message
Where is My Message
 
M08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryptionM08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryption
 

Andere mochten auch

Understanding mq deployment choices and use cases
Understanding mq deployment choices and use casesUnderstanding mq deployment choices and use cases
Understanding mq deployment choices and use casesLeif Davidsen
 
IBM MQ Advanced - IBM InterConnect 2016
IBM MQ Advanced - IBM InterConnect 2016IBM MQ Advanced - IBM InterConnect 2016
IBM MQ Advanced - IBM InterConnect 2016Leif Davidsen
 
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016Leif Davidsen
 
IBM MQ - Comparing Distributed and z/OS platforms
IBM MQ - Comparing Distributed and z/OS platformsIBM MQ - Comparing Distributed and z/OS platforms
IBM MQ - Comparing Distributed and z/OS platformsMarkTaylorIBM
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
Session 1897 messaging in the cloud with elastic mq mq light and bluemix-impa...
Session 1897 messaging in the cloud with elastic mq mq light and bluemix-impa...Session 1897 messaging in the cloud with elastic mq mq light and bluemix-impa...
Session 1897 messaging in the cloud with elastic mq mq light and bluemix-impa...Robert Nicholson
 
Hybrid messaging webcast: Using the best of both worlds to drive your busines...
Hybrid messaging webcast: Using the best of both worlds to drive your busines...Hybrid messaging webcast: Using the best of both worlds to drive your busines...
Hybrid messaging webcast: Using the best of both worlds to drive your busines...sconaomi
 
Hybrid Messaging with IBM Bluemix
Hybrid Messaging with IBM BluemixHybrid Messaging with IBM Bluemix
Hybrid Messaging with IBM Bluemixmatthew1001
 
Effectively Managing a Hybrid Messaging Environment
Effectively Managing a Hybrid Messaging EnvironmentEffectively Managing a Hybrid Messaging Environment
Effectively Managing a Hybrid Messaging EnvironmentAndrew Schofield
 
Messaging in the Cloud with IBM MQ Light and IBM Bluemix
Messaging in the Cloud with IBM MQ Light and IBM BluemixMessaging in the Cloud with IBM MQ Light and IBM Bluemix
Messaging in the Cloud with IBM MQ Light and IBM BluemixRobert Nicholson
 
Whats new in IBM MQ; V9 LTS, V9.0.1 CD and V9.0.2 CD
Whats new in IBM MQ; V9 LTS, V9.0.1 CD and V9.0.2 CDWhats new in IBM MQ; V9 LTS, V9.0.1 CD and V9.0.2 CD
Whats new in IBM MQ; V9 LTS, V9.0.1 CD and V9.0.2 CDDavid Ware
 
Mq ssl channels_on_windows
Mq ssl channels_on_windowsMq ssl channels_on_windows
Mq ssl channels_on_windowskarthickmsit
 
The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...Leif Davidsen
 
MQTC 2016: Monitoring and Tracking MQ and Applications
MQTC 2016: Monitoring and Tracking MQ and ApplicationsMQTC 2016: Monitoring and Tracking MQ and Applications
MQTC 2016: Monitoring and Tracking MQ and ApplicationsRobert Parker
 
MQ Light for Bluemix - IBM Interconnect 2015 session AME4183
MQ Light for Bluemix - IBM Interconnect 2015 session AME4183MQ Light for Bluemix - IBM Interconnect 2015 session AME4183
MQ Light for Bluemix - IBM Interconnect 2015 session AME4183Robert Nicholson
 
IBM Managed File Transfer Portfolio - IBMImpact 2014
IBM Managed File Transfer Portfolio - IBMImpact 2014IBM Managed File Transfer Portfolio - IBMImpact 2014
IBM Managed File Transfer Portfolio - IBMImpact 2014Leif Davidsen
 
InterConnect 2016: What's new in IBM MQ
InterConnect 2016: What's new in IBM MQInterConnect 2016: What's new in IBM MQ
InterConnect 2016: What's new in IBM MQDavid Ware
 
IBM MQ - better application performance
IBM MQ - better application performanceIBM MQ - better application performance
IBM MQ - better application performanceMarkTaylorIBM
 
IBM MQ Disaster Recovery
IBM MQ Disaster RecoveryIBM MQ Disaster Recovery
IBM MQ Disaster RecoveryMarkTaylorIBM
 

Andere mochten auch (20)

Understanding mq deployment choices and use cases
Understanding mq deployment choices and use casesUnderstanding mq deployment choices and use cases
Understanding mq deployment choices and use cases
 
IBM MQ Advanced - IBM InterConnect 2016
IBM MQ Advanced - IBM InterConnect 2016IBM MQ Advanced - IBM InterConnect 2016
IBM MQ Advanced - IBM InterConnect 2016
 
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016
 
IBM MQ - Comparing Distributed and z/OS platforms
IBM MQ - Comparing Distributed and z/OS platformsIBM MQ - Comparing Distributed and z/OS platforms
IBM MQ - Comparing Distributed and z/OS platforms
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
Session 1897 messaging in the cloud with elastic mq mq light and bluemix-impa...
Session 1897 messaging in the cloud with elastic mq mq light and bluemix-impa...Session 1897 messaging in the cloud with elastic mq mq light and bluemix-impa...
Session 1897 messaging in the cloud with elastic mq mq light and bluemix-impa...
 
Hybrid messaging webcast: Using the best of both worlds to drive your busines...
Hybrid messaging webcast: Using the best of both worlds to drive your busines...Hybrid messaging webcast: Using the best of both worlds to drive your busines...
Hybrid messaging webcast: Using the best of both worlds to drive your busines...
 
Hybrid Messaging with IBM Bluemix
Hybrid Messaging with IBM BluemixHybrid Messaging with IBM Bluemix
Hybrid Messaging with IBM Bluemix
 
Effectively Managing a Hybrid Messaging Environment
Effectively Managing a Hybrid Messaging EnvironmentEffectively Managing a Hybrid Messaging Environment
Effectively Managing a Hybrid Messaging Environment
 
Ssl2
Ssl2Ssl2
Ssl2
 
Messaging in the Cloud with IBM MQ Light and IBM Bluemix
Messaging in the Cloud with IBM MQ Light and IBM BluemixMessaging in the Cloud with IBM MQ Light and IBM Bluemix
Messaging in the Cloud with IBM MQ Light and IBM Bluemix
 
Whats new in IBM MQ; V9 LTS, V9.0.1 CD and V9.0.2 CD
Whats new in IBM MQ; V9 LTS, V9.0.1 CD and V9.0.2 CDWhats new in IBM MQ; V9 LTS, V9.0.1 CD and V9.0.2 CD
Whats new in IBM MQ; V9 LTS, V9.0.1 CD and V9.0.2 CD
 
Mq ssl channels_on_windows
Mq ssl channels_on_windowsMq ssl channels_on_windows
Mq ssl channels_on_windows
 
The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...
 
MQTC 2016: Monitoring and Tracking MQ and Applications
MQTC 2016: Monitoring and Tracking MQ and ApplicationsMQTC 2016: Monitoring and Tracking MQ and Applications
MQTC 2016: Monitoring and Tracking MQ and Applications
 
MQ Light for Bluemix - IBM Interconnect 2015 session AME4183
MQ Light for Bluemix - IBM Interconnect 2015 session AME4183MQ Light for Bluemix - IBM Interconnect 2015 session AME4183
MQ Light for Bluemix - IBM Interconnect 2015 session AME4183
 
IBM Managed File Transfer Portfolio - IBMImpact 2014
IBM Managed File Transfer Portfolio - IBMImpact 2014IBM Managed File Transfer Portfolio - IBMImpact 2014
IBM Managed File Transfer Portfolio - IBMImpact 2014
 
InterConnect 2016: What's new in IBM MQ
InterConnect 2016: What's new in IBM MQInterConnect 2016: What's new in IBM MQ
InterConnect 2016: What's new in IBM MQ
 
IBM MQ - better application performance
IBM MQ - better application performanceIBM MQ - better application performance
IBM MQ - better application performance
 
IBM MQ Disaster Recovery
IBM MQ Disaster RecoveryIBM MQ Disaster Recovery
IBM MQ Disaster Recovery
 

Ähnlich wie IBM Cloud Technical University 2016 - How to Transform Your Messaging Environment to a Secure Messaging Environment

Controlling access to your IBM MQ System
Controlling access to your IBM MQ SystemControlling access to your IBM MQ System
Controlling access to your IBM MQ SystemRobert Parker
 
M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019Robert Parker
 
3429 How to transform your messaging environment to a secure messaging envi...
3429   How to transform your messaging environment to a secure messaging envi...3429   How to transform your messaging environment to a secure messaging envi...
3429 How to transform your messaging environment to a secure messaging envi...Robert Parker
 
MQ Security Overview
MQ Security OverviewMQ Security Overview
MQ Security OverviewMarkTaylorIBM
 
MQTC 2016 - IBM MQ Security: Overview & recap
MQTC 2016 - IBM MQ Security: Overview & recapMQTC 2016 - IBM MQ Security: Overview & recap
MQTC 2016 - IBM MQ Security: Overview & recapRobert Parker
 
WebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesWebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesMorag Hughson
 
Large scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear passLarge scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear passAruba, a Hewlett Packard Enterprise company
 
Simplifying IBM MQ Security in your MQ estate
Simplifying IBM MQ Security in your MQ estateSimplifying IBM MQ Security in your MQ estate
Simplifying IBM MQ Security in your MQ estateRobert Parker
 
Securing your IBM MQ environment.
Securing your IBM MQ environment.Securing your IBM MQ environment.
Securing your IBM MQ environment.Robert Parker
 
IBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM Systems UKI
 
nullcon 2011 - Security and Forensic Discovery in Cloud Environments
nullcon 2011 - Security and Forensic Discovery in Cloud Environmentsnullcon 2011 - Security and Forensic Discovery in Cloud Environments
nullcon 2011 - Security and Forensic Discovery in Cloud Environmentsn|u - The Open Security Community
 
Dynamic Service Chaining
Dynamic Service Chaining Dynamic Service Chaining
Dynamic Service Chaining Tail-f Systems
 
Francisco Javier Ramirez Urea - Hopla - OSL19
Francisco Javier Ramirez Urea - Hopla - OSL19Francisco Javier Ramirez Urea - Hopla - OSL19
Francisco Javier Ramirez Urea - Hopla - OSL19marketingsyone
 
AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016Gaurav "GP" Pal
 
Secure Messages with IBM WebSphere MQ Advanced Message Security
Secure Messages with IBM WebSphere MQ Advanced Message SecuritySecure Messages with IBM WebSphere MQ Advanced Message Security
Secure Messages with IBM WebSphere MQ Advanced Message SecurityMorag Hughson
 
Cloud computing-2 (1)
Cloud computing-2 (1)Cloud computing-2 (1)
Cloud computing-2 (1)JUDYFLAVIAB
 
MQ Guide France - What's new in ibm mq 9.1.4
MQ Guide France - What's new in ibm mq 9.1.4MQ Guide France - What's new in ibm mq 9.1.4
MQ Guide France - What's new in ibm mq 9.1.4Robert Parker
 

Ähnlich wie IBM Cloud Technical University 2016 - How to Transform Your Messaging Environment to a Secure Messaging Environment (20)

Controlling access to your IBM MQ System
Controlling access to your IBM MQ SystemControlling access to your IBM MQ System
Controlling access to your IBM MQ System
 
M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019
 
3429 How to transform your messaging environment to a secure messaging envi...
3429   How to transform your messaging environment to a secure messaging envi...3429   How to transform your messaging environment to a secure messaging envi...
3429 How to transform your messaging environment to a secure messaging envi...
 
MQ Security Overview
MQ Security OverviewMQ Security Overview
MQ Security Overview
 
MQTC 2016 - IBM MQ Security: Overview & recap
MQTC 2016 - IBM MQ Security: Overview & recapMQTC 2016 - IBM MQ Security: Overview & recap
MQTC 2016 - IBM MQ Security: Overview & recap
 
WebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesWebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changes
 
Large scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear passLarge scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear pass
 
Simplifying IBM MQ Security in your MQ estate
Simplifying IBM MQ Security in your MQ estateSimplifying IBM MQ Security in your MQ estate
Simplifying IBM MQ Security in your MQ estate
 
Securing your IBM MQ environment.
Securing your IBM MQ environment.Securing your IBM MQ environment.
Securing your IBM MQ environment.
 
IBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM MQ Channel Authentication
IBM MQ Channel Authentication
 
nullcon 2011 - Security and Forensic Discovery in Cloud Environments
nullcon 2011 - Security and Forensic Discovery in Cloud Environmentsnullcon 2011 - Security and Forensic Discovery in Cloud Environments
nullcon 2011 - Security and Forensic Discovery in Cloud Environments
 
Dynamic Service Chaining
Dynamic Service Chaining Dynamic Service Chaining
Dynamic Service Chaining
 
batch-4.pptx
batch-4.pptxbatch-4.pptx
batch-4.pptx
 
Francisco Javier Ramirez Urea - Hopla - OSL19
Francisco Javier Ramirez Urea - Hopla - OSL19Francisco Javier Ramirez Urea - Hopla - OSL19
Francisco Javier Ramirez Urea - Hopla - OSL19
 
AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016
 
Secure Messages with IBM WebSphere MQ Advanced Message Security
Secure Messages with IBM WebSphere MQ Advanced Message SecuritySecure Messages with IBM WebSphere MQ Advanced Message Security
Secure Messages with IBM WebSphere MQ Advanced Message Security
 
Cloud computing-2 (1)
Cloud computing-2 (1)Cloud computing-2 (1)
Cloud computing-2 (1)
 
MQ Guide France - What's new in ibm mq 9.1.4
MQ Guide France - What's new in ibm mq 9.1.4MQ Guide France - What's new in ibm mq 9.1.4
MQ Guide France - What's new in ibm mq 9.1.4
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.ppt
 
brocade-swisscom-ss
brocade-swisscom-ssbrocade-swisscom-ss
brocade-swisscom-ss
 

Mehr von Robert Parker

IBM MQ Token Authentication.pdf
IBM MQ Token Authentication.pdfIBM MQ Token Authentication.pdf
IBM MQ Token Authentication.pdfRobert Parker
 
IBM MQ Whats new - up to 9.3.4.pdf
IBM MQ Whats new - up to 9.3.4.pdfIBM MQ Whats new - up to 9.3.4.pdf
IBM MQ Whats new - up to 9.3.4.pdfRobert Parker
 
IBM MQ Whats new - including 9.3 and 9.3.1
IBM MQ Whats new - including 9.3 and 9.3.1IBM MQ Whats new - including 9.3 and 9.3.1
IBM MQ Whats new - including 9.3 and 9.3.1Robert Parker
 
What's new in IBM MQ
What's new in IBM MQWhat's new in IBM MQ
What's new in IBM MQRobert Parker
 
IBM MQ in Containers - Think 2018
IBM MQ in Containers - Think 2018IBM MQ in Containers - Think 2018
IBM MQ in Containers - Think 2018Robert Parker
 
IBM MQ security deep dive including AMS MQTC 2017
IBM MQ security deep dive including AMS MQTC 2017IBM MQ security deep dive including AMS MQTC 2017
IBM MQ security deep dive including AMS MQTC 2017Robert Parker
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 

Mehr von Robert Parker (7)

IBM MQ Token Authentication.pdf
IBM MQ Token Authentication.pdfIBM MQ Token Authentication.pdf
IBM MQ Token Authentication.pdf
 
IBM MQ Whats new - up to 9.3.4.pdf
IBM MQ Whats new - up to 9.3.4.pdfIBM MQ Whats new - up to 9.3.4.pdf
IBM MQ Whats new - up to 9.3.4.pdf
 
IBM MQ Whats new - including 9.3 and 9.3.1
IBM MQ Whats new - including 9.3 and 9.3.1IBM MQ Whats new - including 9.3 and 9.3.1
IBM MQ Whats new - including 9.3 and 9.3.1
 
What's new in IBM MQ
What's new in IBM MQWhat's new in IBM MQ
What's new in IBM MQ
 
IBM MQ in Containers - Think 2018
IBM MQ in Containers - Think 2018IBM MQ in Containers - Think 2018
IBM MQ in Containers - Think 2018
 
IBM MQ security deep dive including AMS MQTC 2017
IBM MQ security deep dive including AMS MQTC 2017IBM MQ security deep dive including AMS MQTC 2017
IBM MQ security deep dive including AMS MQTC 2017
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 

KĂźrzlich hochgeladen

How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto GonzĂĄlez Trastoy
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 

KĂźrzlich hochgeladen (20)

How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 

IBM Cloud Technical University 2016 - How to Transform Your Messaging Environment to a Secure Messaging Environment

  • 1. IBM Cloud Technical University 2016 25 – 28 October 2016|Madrid, Spain I173 How to Transform Your Messaging Environment to a Secure Messaging Environment Rob Parker, MQ Ecosystem
  • 2. 2 • IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. • Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. • The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. • The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. • Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. Please Note:
  • 3. Š 2016 IBM Corporation 3 Agenda • Aims of this presentation  Step by step of each security feature in MQ  Will take an unsecured Queue Manager and secure it  At the end we will have a secured Queue Manager • Each security feature section will have:  What is it and Why do you use it  Main points of the feature  How to configure it.
  • 4. Š 2016 IBM Corporation 4 Available Security Features • Connection Authentication • Authorisation • Channel Authentication • Transport Layer Security (TLS) • Security Exits • AMS
  • 5. Š 2016 IBM Corporation 5 Client to Queue Manager connections (Net) Channel Authentication (BLOCKADDR) TLS Channel Authentication (ADDR/USER/SSL Map) Security Exit Connection Authentication Channel Authentication (BLOCKUSER) Authorisation MQRC_NONE MQRC_NOT_AUTHORIZED Or
  • 6. Š 2016 IBM Corporation 6 Client to Queue Manager connections (Local) Channel Authentication (BLOCKADDR) TLS Channel Authentication (ADDR/USER/SSL Map) Security Exit Connection Authentication Channel Authentication (BLOCKUSER) Authorisation
  • 7. Š 2016 IBM Corporation 7 Queue Manager to Queue Manager Channel Authentication (BLOCKADDR) TLS Channel Authentication (ADDR/QMName/SSL Map) Security Exit Authorisation
  • 8. Š 2016 IBM Corporation 8 Working example • Queue Manager • Channel Type(SVRCONN) • Local Queue • Channel Authentication – Disabled • Connection Authentication – Disabled • MQ Administrator set on Channel MCA • No Security Exit • TLS not configured • AMS not configured CTU Client.Data.Q Client.Connections
  • 9. IBM Cloud Technical University 2016 25 – 28 October 2016|Madrid, Spain Connection Authentication
  • 10. Š 2016 IBM Corporation 10 Introduction • Authentication is used to force clients to identify themselves. • It is usually used in combination with authorisation. • Connection authentication was added as a feature of MQ in version 8. *****
  • 11. Š 2016 IBM Corporation 11 Main features • MQ allows you to specify levels of security for connections  Client and local can be set to different levels  Different client connections can have different levels using Channel Authentication records. • Also allows two different user repositories to check supplied credentials against  Operating system OAM.  LDAP Server *****
  • 12. Š 2016 IBM Corporation 12 Configuration DEFINE AUTHINFO(USE.OS) AUTHTYPE(IDPWOS) DEFINE AUTHINFO(USE.LDAP) AUTHTYPE(IDPWLDAP) CONNAME(‘ldap1(389),ldap2(389)’) LDAPUSER(‘CN=QMGR1’) LDAPPWD(‘passw0rd’) SECCOMM(YES) MQCONNX User1 + pwd1 Application (User2) QMGR CTU O/S User Repository (z/OS + Dist) LDAP Server (Dist only)
  • 13. Š 2016 IBM Corporation 13 Configuration CHCK… NONE OPTIONAL REQUIRED REQDADM MQCONNX MQCONNX Application (User2) QMGR CTUInter process Communications DEFINE AUTHINFO(USE.PW) AUTHTYPE(xxxxxx) CHCKLOCL(OPTIONAL) CHCKCLNT(REQUIRED) ADOPTCTX(NO) ALTER QMGR CONNAUTH(USE.PW) REFRESH SECURITY TYPE(CONNAUTH) MQRC_NOT_AUTHORIZED (2035) MQRC_NONE (0) User Repository Application (User4)
  • 14. Š 2016 IBM Corporation 14 Configuration DEFINE AUTHINFO(USE.PW) AUTHTYPE(xxxxxx) CHCKCLNT(OPTIONAL) SET CHLAUTH(‘*’) TYPE(ADDRESSMAP) ADDRESS(‘*’) USERSRC(CHANNEL) CHCKCLNT(REQUIRED) ADOPTCTX(NO) SET CHLAUTH(‘*’) TYPE(SSLPEERMAP) SSLPEER(‘CN=*’) USERSRC(CHANNEL) CHCKCLNT(ASQMGR) CHCKCLNT ASQMGR REQUIRED REQDADM QMGR CTU User's Digital Certificate CA Sig MQCONNX Application (User2) MQRC_NONE (0) SSL/TLS Network Communications MQCONNX Application (User4) MQRC_NOT_AUTHORIZED (2035)
  • 15. Š 2016 IBM Corporation 15 Configuration • Procedural MQI changes: • MQCSP structure  Connection Security Parameters  User ID and password • MQCNO structure  Connection Options MQCNO cno = {MQCNO_DEFAULT}; cno.Version = MQCNO_VERSION_5; cno.SecurityParmsPtr = &csp; MQCONNX(QMName, &cno, &hConn, &CompCode, &Reason); MQCSP csp = {MQCSP_DEFAULT}; csp.AuthenticationType = MQCSP_AUTH_USER_ID_AND_PWD; csp.CSPUserIdPtr = “parrobe"; csp.CSPUserIdLength = 7; /* Max: MQ_CLIENT_USER_ID_LENGTH */ csp.CSPPasswordPtr = "passw0rd"; csp.CSPPasswordLength = 8; /* Max: MQ_CSP_PASSWORD_LENGTH */
  • 16. Š 2016 IBM Corporation 16 Configuration • Object Oriented MQ classes changes • JMS/XMS classes changes MQEnvironment.properties = new Hashtable(); MQEnvironment.userID = “parrobe"; MQEnvironment.password ="passw0rd"; System.out.println("Connecting to queue manager"); MQQueueManager qMgr = new MQQueueManager(QMName); cf = getCF(); System.out.println("Creating the Connection with UID and Password"); Connection conn = cf.createConnection(“parrobe", "passw0rd");
  • 17. IBM Cloud Technical University 2016 25 – 28 October 2016|Madrid, Spain Authorisation
  • 18. Š 2016 IBM Corporation 18 Introduction • Authorisation is used to limit what connected applications can do. • Authority can be given on a per group basis  Windows allows per user by default  Linux can do per user with configuration • Authority to perform an action is given.  By default a user/group will not have any authority • Best practice is to only grant minimum required authority
  • 19. Š 2016 IBM Corporation 19 Features • Each object in MQ can have separate authorities for each user/group  Additionally you can also supply a generic object name • MQ supplies 5 tools to view and modify authority records  MQ Explorer ⁝ Display, create and alter authority records for all objects
  • 20. Š 2016 IBM Corporation 20 Tools (continued)  runmqsc ⁝ Display, create & Alter Authority records for all objects  setmqaut ⁝ Create & Alter authority records for requested objects  dspmqaut ⁝ Displays authority records for requested objects  dmpmqaut ⁝ Outputs authority records for requested objects, output can be inputted into QMGR.
  • 21. Š 2016 IBM Corporation 21 Which user is used for authorization? Method Notes Client machine user ID flowed to server This will be over-ridden by anything else. Rarely do you want to trust an unauthenticated client side user ID. MCAUSER set on SVRCONN channel definition A handy trick to ensure that the client flowed ID is never used is to define the MCAUSER as ‘rubbish’ and then anything that is not set appropriately by one of the next methods cannot connect. MCAUSER set by ADOPTCTX(YES) The queue manager wide setting to adopt the password authenticated user ID as the MCAUSER will over-ride either of the above. MCAUSER set by CHLAUTH rule To allow more granular control of MCAUSER setting, rather than relying on the above queue manager wide setting, you can of course use CHLAUTH rules MCAUSER set by Security Exit Although CHLAUTH gets the final say on whether a connection is blocked (security exit not called in that case), the security exit does get called with the MCAUSER CHLAUTH has decided upon, and can change it.
  • 22. Š 2016 IBM Corporation 22 Configuration • Example 1: Granting clients the ability to read to the Queue  Here we will give the group “readers” authority to connect  In a command prompt • Queue Manager to create authority record for • Object type you are creating authority record for • Group to give authority to • Authorities Setmqaut –m CTU –t qmgr –g readers +connect
  • 23. Š 2016 IBM Corporation 23 Configuration • Example 1: Granting clients the ability to read to the Queue  Here we will give the group “readers” GET and BROWSE authority  In runmqsc. • Object to grant authorities for • Object type • Group to grant authority • Authority to add SET AUTHREC PROFILE(CLIENT.DATA.Q) OBJTYPE(QUEUE) + GROUP(‘readers’) AUTHADD(GET) AUTHADD(BROWSE)
  • 24. IBM Cloud Technical University 2016 25 – 28 October 2016|Madrid, Spain Channel Authentication Records
  • 25. Š 2016 IBM Corporation 25 Introduction • Allows Granular control over connections  Can Supply a whitelist or blacklist to block or allow connections • Can filter on:  SSL distinguished name (both issuer and subject)  Client user ID (Application or final adopted)  Remote Queue Manager name  IP/Hostname  Blocking at channel (ADDRESSMAP) or listener (BLOCKADDR) level
  • 26. Š 2016 IBM Corporation 26 Features • Values used in filters can be specific or generic • Specific rules have higher precedence than generic rules 1. Addressmap blocking ‘*’ 2. Addressmap allowing ‘127.0.0.1’  Any connections from 127.0.0.1 will be allowed by (2).  Other connections blocked by (1)
  • 27. Š 2016 IBM Corporation 27 Features • When creating Channel Authentication rule you can set it to use a different User ID for future authority checks:  NOACCESS – Blocks the connection regardless  CHANNEL – Use the User ID specified in Channel MCA ⁝ If this is blank then we use the userid supplied by application  MAP – Use the User ID specified in this rule.
  • 28. Š 2016 IBM Corporation 28 Configuration • Example 1: Blacklisting bad connections  Aim: Block connections from 129.1.198.X • In Rumqsc: • Channel name • Rule type • Address to match to • Action • Warn SET CHLAUTH(‘CLIENT.CONNECTIONS’) TYPE(ADDRESSMAP) + ADDRESS(‘129.1.198.*’) USERSRC(NOACCESS) WARN(NO)
  • 29. Š 2016 IBM Corporation 29 Configuration • In MQ Explorer:
  • 30. IBM Cloud Technical University 2016 25 – 28 October 2016|Madrid, Spain Transport Layer Security
  • 31. Š 2016 IBM Corporation 31 Introduction • TLS is used for two reasons in MQ:  Authentication with a Queue Manager  Encrypting and protecting data in transit between a client or Queue Manager and destination Queue Manager. • Uses a certificate containing a public-private key pair in order to establish a secure link.  Called an SSL Handshake.
  • 32. Š 2016 IBM Corporation 32 Features • During the SSL Handshake, asymmetric encryption is used.  Once the handshake is completed symmetric encryption is used to transfer data. • Channels are enabled for SSL/TLS by setting a CipherSpec.  Only one CipherSpec can be used on a channel.
  • 33. Š 2016 IBM Corporation 33 Features • A server Queue Manager must have a certificate • A client application (or client Queue Manager) does not require a certificate.  But does require a copy of the server Queue Manager’s public certificate. • As of MQ v8 a channel can use a different certificate than the Queue Manager it is defined on.
  • 34. Š 2016 IBM Corporation 34 Tools • MQ Supplies 3 tools for your certificate and key repository management needs:  strmqikm (or IBM Key Management) ⁝ IBM JRE GUI tool for managing certificates  runmqckm ⁝ command line tool to manage certificates – can handle JKCS repositories  runmqakm ⁝ Command line tool to manage certificates – can handle Elliptic Curve certificates
  • 35. Š 2016 IBM Corporation 35 Defaults • Default location for Queue Manager Key Repository is  <MQ Data Root>/qmgrs/<QM Name>/ssl/key.kdb ⁝ Can be changed using Queue Manager SSLKEYR attribute • Default certificate used by the Queue Manager is  Ibmwebspheremq<qmname> ⁝ Can be changed in MQ v8+ using Queue Manager CERTLABL attribute
  • 36. Š 2016 IBM Corporation 36 Configuration • Example 1: Setting up a Queue Manager to use SSL/TLS • First create the Key Repository the Queue Manager will use:  In a command prompt: • What we are altering • Action to perform • Name and location of key repository to create • Password to access the key repository • Tells runmqakm to stash the password which is used by MQ. runmqakm –keydb –create –db /var/mqm/qmgrs/CTU/ssl/key.kdb –pw passw0rd -stash
  • 37. Š 2016 IBM Corporation 37 Configuration • Example 1: Setting up a Queue Manager to use SSL/TLS • Next create the Queue Manager’s certificate • In a command prompt: • What we are altering • The action to perform • Where to store the certificate • Tells runmqakm to use the stash file to access the key repository • The distinguished name to give the certificate • The label to refer to the certificate runmqakm –cert –create –db /var/mqm/qmgrs/CTU/ssl/key.kdb –stashed –dn “CN=CTU,OU=MQ,O=IBM,C=UK” –label ibmwebspheremqctu
  • 38. Š 2016 IBM Corporation 38 Configuration • Example 1: Setting up a Queue Manager to use SSL/TLS • Next set the Queue Manager to use Key Repository  Unless you are using defaults  In runmqsc • Location of the key repository to use  No file extension! • Label of certificate to use ALTER QMGR SSLKEYR(‘/var/mqm/qmgrs/CTU/ssl/key’) + CERTLABL(‘ibmwebspheremqctu’)
  • 39. Š 2016 IBM Corporation 39 Configuration • Example 1: Setting up a Queue Manager to use SSL/TLS • Finally set a channel to use SSL  In runmqsc • Channel name • Whether to enforce mutual authentication • The CipherSpec to use on this channel ALTER CHANNEL(‘CLIENT.CONNECTIONS’) SSLCAUTH(REQUIRED) + SSLCIPH(TLS_RSA_WITH_AES_128_CBC_SHA256)
  • 40. Š 2016 IBM Corporation 40 Configuration • Example 1: Client application changes • MQSCO structure • SSL Security Parameters • Location of Key Repository • Certificate label to use (MQ v8 Only) • MQCNO structure • Connection Options MQSCO sco = {MQSCO_DEFAULT}; sco.version = MQSCO_VERSION_5 sco.KeyRepository = “/var/client/clientkeyr”; Sco.CertificateLabel = “clientcertificate” MQCNO cno = {MQCNO_DEFAULT}; cno.Version = MQCNO_VERSION_4; cno.SSLConfigPtr = &sco; MQCONNX(QMName, &cno, &hConn, &CompCode, &Reason);
  • 41. Š 2016 IBM Corporation 41 Configuration • Example 1: Client application • Alternatively, if you cannot adjust your application  In command prompt EXPORT MQSSLKEYR=var/client/clientkeyr EXPORT MQCERTLABL=clientcertificate
  • 42. Š 2016 IBM Corporation 42 Configuration • Example 1: Client application  Ensure the certificate trust chain is complete on each side ibmwebspheremqctu Queue Manager KeystoreClient Keystore runmqakm –cert –extract –db /var/mqm/qmgrs/CTU/ssl/key.kdb –stashed –label ibmwebspheremqctu –file /var/certs/qmgr.cer Qmgr.cer
  • 43. Š 2016 IBM Corporation 43 Configuration • Example 1: Client application  Ensure the certificate trust chain is complete on each side ibmwebspheremqctu Queue Manager KeystoreClient Keystore Qmgr.cer runmqakm –cert –add –db /var/client/clientkeyr.kdb –stashed –label qmgrsignercert –file /var/certs/qmgr.cer qmgrsignercert
  • 44. Š 2016 IBM Corporation 44 Configuration • Example 1: Client application (Mutual Authentication)  Ensure the certificate trust chain is complete on each side ibmwebspheremqctu Queue Manager KeystoreClient Keystore client.cerqmgrsignercert clientcertificate clientsignercert runmqakm –cert –extract –db /var/client/clientkeyr.kdb –stashed –label clientcertificate –file /var/certs/client.cer runmqakm –cert –add –db /var/mqm/qmgrs/CTU/ssl/key.kdb –stashed –label clientsignercert –file /var/certs/client.cer
  • 45. IBM Cloud Technical University 2016 25 – 28 October 2016|Madrid, Spain Security Exits
  • 46. Š 2016 IBM Corporation 46 Introduction • Security exits are bespoke, customer created exists that are ran during the security checks. • MQ contains an API used in the security exits to extract information about an incoming connection.  This information can then be used in the security exit to determine whether to allow or disallow a connection. • Prior to MQ v8 a security exit was used in MVS to supply connection authentication capabilities  CSQ4BCX3
  • 47. Š 2016 IBM Corporation 47 Features • Security exits are stored in  <MQ Data Root>/exits/<Installation name> • MQ will look in this folder when an exit is attached to a channel • Exits are referenced in SCYEXIT channel attribute  Without the file suffix or location
  • 48. Š 2016 IBM Corporation 48 Features • As well as security exits there are also:  Receive exits – RCVEXIT  Send exits – SENDEXIT • For each exit you can also supply custom data to pass to the exit using the channel’s ***DATA attribute  For example Security exit data using SCYDATA
  • 49. Š 2016 IBM Corporation 49 Configuration • First write a C Application with the following skeleton code: void MQENTRY MQStart() {;} void MQENTRY EntryPoint (PMQVOID pChannelExitParms, PMQVOID pChannelDefinition, PMQLONG pDataLength, PMQLONG pAgentBufferLength, PMQVOID pAgentBuffer, PMQLONG pExitBufferLength, PMQPTR pExitBufferAddr) { PMQCXP pParms = (PMQCXP)pChannelExitParms; PMQCD pChDef = (PMQCD)pChannelDefinition; /* TODO: Add Security Exit Code Here */ }
  • 50. Š 2016 IBM Corporation 50 Configuration • Next compile and link the exit as a Dynamic library and place in:  <MQ Data Root>/exits/<Installation name>
  • 51. Š 2016 IBM Corporation 51 Configuration • Next specify the exit on the channel:  In runmqsc • Channel name • Name of security exit to run  Without location or file extension • Custom data to pass to the security exit ALTER CHANNEL(‘CLIENT.CONNECTIONS’) SCYEXIT(‘mqccred’) + SCYDATA(‘sec exit data’)
  • 52. IBM Cloud Technical University 2016 25 – 28 October 2016|Madrid, Spain Advanced Messaging Security
  • 53. Š 2016 IBM Corporation 53 Introduction • AMS provides a higher level of protection to messages • Has two levels of protection - policies  Integrity protection ⁝ Prevents messages from being tampered with. ⁝ Guarantees message has been received from known source  Integrity and privacy protection ⁝ Same benefits as Integrity protection ⁝ Also provides encryption to prevent unauthorised recipients seeing message !*54% @”p
  • 54. Š 2016 IBM Corporation 54 Features • AMS does not perform access control but simply provides privacy and integrity to messages. • Messages are protected using certificates that each signer and recipient will need.  Depending on level of protection !*54% @”p
  • 55. Š 2016 IBM Corporation 55 Features • It is an end-to-end security model  Messages are protected from creation until destruction • Messages can be protected so that only authorised users can see message data  This means even MQ Administrators cannot view a message. • Messages are protected both in transit and at rest  Satisfies the standards compliance for certain data types (HIPAA, PCI, etc) !*54% @”p
  • 56. Š 2016 IBM Corporation 56 Features • AMS is incorporated into MQ Client applications without the need for re-building applications  No code changes are necessary! • Message size will increase in order to incorporate AMS format  New message size = 1280 + [Old Message Length] + (200 x [# of recipients]) !*54% @”p
  • 57. Š 2016 IBM Corporation 57 Tools • Unlike SSL, it requires the FULL trust chain  Subject certificate, signer certificate, signer’s signer certificate, etc • MQ has three tools for defining and managing policies  MQ Explorer ⁝ Define, display, delete policies  setmqspl ⁝ Define, delete policies  dspmqspl ⁝ Display policies !*54% @”p
  • 58. Š 2016 IBM Corporation 58 Configuration • Example 1: Configuring MQ to protect messages  In a command prompt: • Queue Manager • Queue to protect • Signing algorithm • Authorised signer • Encryption algorithm • Authorised recipient !*54% @”p setmqspl -m CTU -p CLIENT.DATA.Q -s SHA512 -a "CN=CLIENT1,O=CLIENTORG,C=UK" -e AES256 -r "CN=CLIENT2,O=CLIENTORG,C=UK"
  • 59. Š 2016 IBM Corporation 59 Configuration Example 1: Application changes !*54% @”p Alice’s Sending/Receiving App AliceCertificate MQS_KEYSTORE_CONF=/…/Keystore.conf (Or create Keystore.conf in home directory) No Changes Necessary! Keystore.conf cms.keystore=/…/Keystore cms.certificate=AliceCertificate Keystore
  • 60. For Additional Information  IBM Digital Experience Solutions http://www-01.ibm.com/software/collaboration/digitalexperience  WebSphere Portal and IBM Web Content Manager Information Center Wiki http://www-10.lotus.com/ldd/portalwiki.nsf/  IBM Digital Experience Demonstrations: http://www.youtube.com/user/IBMXWebX • IBM Digital Experience Developer http://developer.ibm.com/digexp  IBM Software Business Solutions Catalog https://greenhouse.lotus.com/catalog/
  • 61. Where can I get more information about IBM MQ? IBM Messaging developerWorks developer.ibm.com/messaging IBM Messaging Youtube https://www.youtube.com/IBMmessagingMedia LinkedIn Ibm.biz/ibmmessaging Twitter @IBMMessaging IBM MQ Facebook Facebook.com/IBM-MQ-8304628654/
  • 62. Rob Parker Thank you very much. IBM IBM MQ Ecosystem parrobe@uk.ibm.com Š 2016 IBM Corporation 62
  • 63. Š 2016 IBM Corporation 63 Your feedback is valuable Please complete your session or lab evaluation! Session number I173 Provide your evaluations by: Evaluation forms: Fill out a form at the end of each session Paper forms are located in each of the session or lab rooms Complete the session survey on Event Connect Portal: ibmeventconnect.com/madrid2016 Select Sessions, then Session Finder, and complete the survey - Or -
  • 64. Notes and Disclaimers 64 Copyright Š 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law
  • 65. Notes and Disclaimers 65 Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. IBM, the IBM logo, ibm.com, AsperaÂŽ, Bluemix, Blueworks Live, CICS, Clearcase, CognosÂŽ, DOORSÂŽ, EmptorisÂŽ, Enterprise Document Management System™, FASPÂŽ, FileNetÂŽ, Global Business Services ÂŽ, Global Technology Services ÂŽ, IBM ExperienceOne™, IBM SmartCloudÂŽ, IBM Social BusinessÂŽ, Information on Demand, ILOG, MaximoÂŽ, MQIntegratorÂŽ, MQSeriesÂŽ, NetcoolÂŽ, OMEGAMON, OpenPower, PureAnalytics™, PureApplicationÂŽ, pureCluster™, PureCoverageÂŽ, PureDataÂŽ, PureExperienceÂŽ, PureFlexÂŽ, pureQueryÂŽ, pureScaleÂŽ, PureSystemsÂŽ, QRadarÂŽ, RationalÂŽ, RhapsodyÂŽ, Smarter CommerceÂŽ, SoDA, SPSS, Sterling CommerceÂŽ, StoredIQ, TealeafÂŽ, TivoliÂŽ, TrusteerÂŽ, UnicaÂŽ, urban{code}ÂŽ, Watson, WebSphereÂŽ, WorklightÂŽ, X-ForceÂŽ and System zÂŽ Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.