BEA Logo BEA Tuxedo Release 7.1

  Corporate Info  |  News  |  Solutions  |  Products  |  Partners  |  Services  |  Events  |  Download  |  How To Buy

 

   Tuxedo Doc Home   |   Security   |   Topic List   |   Previous   |   Next   |   Contents

   Using BEA Tuxedo Security

Security Plug-ins

As shown in the following figure, all but one of the security capabilities available with the BEA Tuxedo system are implemented through a plug-in interface, which allows BEA Tuxedo customers to independently define and dynamically add their own security plug-ins. A security plug-in is a code module that implements a particular security capability.

BEA Tuxedo Plug-in Security Architecture

The specifications for the security plug-in interface are not generally available, but are available to third-party security vendors who have entered into a special agreement with BEA Systems. BEA Tuxedo customers who want to customize a security capability must contact one of these vendors. For example, a BEA Tuxedo customer who wants a custom implementation of public key security must contact a third-party security vendor who can provide the appropriate plug-ins.

For more information about security plug-ins, including installation and configuration procedures, see your BEA account executive.

See Also