Corporate Info | News | Solutions | Products | Partners | Services | Events | Download | How To Buy
http://www.oracle.com/technology/documentation/index.html | Site Map | Search | PDF Files | Contact | Glossary
Tuxedo Doc Home | Security | Topic List | Previous | Next | Contents
Using BEA Tuxedo Security
Programming an Application with Security
The BEA Tuxedo system offers various ATMI functions for different security needs.
If you are writing security code for . . .
Then you use the ATMI functions available for . . .
Client programs so that clients can join a BEA Tuxedo application and access application services
Clients joining an application, which in turn invoke system-level calls to the authentication and authorization plug-ins
Both client and server programs to protect the integrity and privacy of the data they exchange
Public key security, which supports end-to-end digital signing and data encryption
See Also
Setting Up the Programming Environment
Copyright © 2000 BEA Systems, Inc. All rights reserved. Required browser: Netscape 4.0 or higher, or Microsoft Internet Explorer 4.0 or higher.