Extending the Security Policy Enforcement Point (PEP) sample

This sample uses the IBM Integration message flows that emulate the operation of Security Trust Service (STS). The true security implementation depends on the use of an external centralised security provider to provide authentication, authorization, and mapping. You can extend the sample to incorporate security enforcement by using your own security provider, for example TFIM V6.2

You can extend the sample to work with TFIM V6.2 by completing the following tasks. However, for detailed information about the TFIM V6.2 configuration with the integration node read the following topics in the IBM Integration Bus documentation:

For security operations at the HTTP_ID HTTPInput node:

  1. Create a security profile with the following properties:
  2. On the TFIM v6.2, create a trust chain with the following properties:

For security operations at the PEP_UP_A1A2 SecurityPEP node

  1. Create a security profile with the following properties:
  2. On the TFIMv6.2, create a trust chain with the following properties:

For security operations at the PEP_MAPUP->SAML2.0 SecurityPEP node:

  1. Create a security profile with the following properties:
  2. On the TFIMv6.2, create a trust chain with the following properties:

For security operations at SecurityPEP node in the Web service flow:

  1. Create a security profile with the following properties:
  2. On the TFIMv6.2, create a trust chain with the following properties:

For instructions and more information, see Setting up message flow security and Message flow security overview in the IBM Integration Bus documentation.

Back to sample home