Securing JMS integration

Sterling™ Order Management System Software applications use Java™ Messaging Services (JMS) for many reasons, including intermediate message queue for interoperability or integration reasons and work-in-progress messages by the IBM® agents

The queues are unfortunately implemented without security, which potentially would expose them to unauthenticated access. One way to prevent this is to secure access to the JMS resources. Once you have secured access to the JMS resources, you will have to configure the agents so that they authenticate to the queues.

Related examples

Examples of how to secure JMS resources can be found in these topics: