How do I plan and secure integration nodes?

New users: Use the links in this topic to find out how to plan and set up security for your IBM® App Connect Enterprise solution.

For testing purposes, you can create an integration node in the IBM App Connect Enterprise Toolkit. For production purposes, you must plan your configuration carefully; see Planning your IBM App Connect Enterprise solution

What do I need to know about integration nodes?

Use the links in this section to find information that you might find useful before you plan and design your integration nodes.

  • What is an integration node? An integration node is a set of execution processes (including one or more integration servers) that hosts one or more message flows to route, transform, and enrich in-flight messages. Follow this link to get information about integration nodes, and the resources that you need to create and configure your integration nodes.

  • What is an operation mode? The operation mode that you use is determined by the license that you purchased when you bought the product. The mode can either give you the full operating capabilities of IBM App Connect Enterprise, that is, Production-Advanced mode, or restrict the operating capabilities of your integration nodes, that is, Production-Standard mode.

    You can set the operation mode when you create an integration node, however, integration nodes are created, or migrated from previous versions, in Production-Advanced mode by default. Follow this link to get information about the various modes that are available.

  • What do I need to know about databases? You can configure your message flows to access data in databases; you can read from, write to, and update the information in a supported database. Follow this link to find out more about databases and how to create connections to them.

What do I need to know about authorization and security?

You must set up access and authorization credentials for some of the resources that you use with IBM App Connect Enterprise; for example, databases. Follow the links in this section to get information about authorization, access control, and security for your integration nodes and integration servers.

How do I plan integration nodes?

Use the following links to find out how to plan your integration nodes. You can also find out about tasks you must complete before you can configure your integration nodes.

  • How do I plan my environment? Follow this link to find out what you must consider when you plan your integration nodes and your system architecture.
  • How do I set up security? Follow this link for information about how to set up security for your integration nodes. Each link comprises a list of reminders or questions about the security tasks to consider for your integration node's configuration. The answers to the questions provide the security information that you need to configure your integration nodes, and also give you further information about other security controls that you might want to deploy.