Interoperating with Release 6.5 BEA Tuxedo Software
Interoperating with Pre-Release 6.5 BEA Tuxedo Software
Compatibility/Interaction with Data-dependent Routing
Compatibility/Interaction with Threads
Compatibility/Interaction with the EventBroker
Compatibility/Interaction with /Q
Compatibility/Interaction with Transactions
Compatibility/Interaction with Domain Gateways
Compatibility/Interaction with Other Vendors' Gateways
How the WSH Establishes an Identity for an Older Client
How the Domain Gateway Establishes an Identity for an Older Client
How the Server Establishes an Identity for an Older Client
Setting a Postdated Limit for Signature Timestamps
Example UBBCONFIG Entries for Postdated Limit
Setting a Predated Limit for Signature Timestamps
Example UBBCONFIG Entries for Predated Limit
Enforcing the Signature Policy for Incoming Messages
How the EventBroker Signature Policy Is Enforced
How the /Q Signature Policy Is Enforced
How the Remote Client Signature Policy Is Enforced
Enforcing the Encryption Policy for Incoming Messages
How the EventBroker Encryption Policy Is Enforced
How the /Q Encryption Policy Is Enforced
How the Remote Client Encryption Policy Is Enforced
Example UBBCONFIG Entries for Principal Names and Decryption Keys
Digital Signature Error Handling
Establishing Security by Editing the Configuration File
Establishing Security by Changing the TM_MIB
Establishing Security by Using the BEA Administration Console
Converting System Security Data Files to BEA Tuxedo User and Group Files
Adding, Modifying, or Deleting Users and Groups
Changing Entries for Users and Groups Through Commands
Changing Entries for Users and Groups Through the ACL_MIB
Changing ACL Entries Through Commands
Changing ACL Entries Through the ACL_MIB
OpenLDAP for X.509 Certificate Lookup
Step 1: Opening a Key Handle for Digital Signature
Step 2 (Optional): Getting Key Handle Information
Step 3 (Optional): Changing Key Handle Information
Step 4: Allocating a Buffer and Putting a Message in the Buffer
Step 5: Marking the Buffer for Digital Signature
Step 7: Closing the Signer's Key Handle
How the System Generates a Digital Signature
Verifying and Transmitting an Input Buffer's Signatures
Replacing an Output Buffer's Signatures
Step 1: Opening a Key Handle for Encryption
Step 2 (Optional): Getting Key Handle Information
Step 3 (Optional): Changing Key Handle Information
Step 4: Allocating a Buffer and Putting a Message in the Buffer
Step 5: Marking the Buffer for Encryption
Step 7: Closing the Encryption Key Handle
How the System Encrypts a Message Buffer
Step 1: Opening a Key Handle for Decryption
Step 2 (Optional): Getting Key Handle Information
Step 3 (Optional): Changing Key Handle Information
Step 4: Closing the Decryption Key Handle
How the System Decrypts a Message Buffer
Discarding an Input Buffer's Encryption Envelopes
Replacing an Output Buffer's Encryption Envelopes
Syntax Requirements for LAUTHSVR Configuration File
LAUTHSVR Configuration File Keywords
Example LAUTHSVR Configuration File
Example LAUTHSVR Configuration of Multiple Network Addresses
Example LAUTHSVR Configuration for Database Search Order
Assigning New Passwords for the tpusr File
tpmigldap Command Line Options
Adding New User Information in tpusr or tpgrp
Adding New User Information Using the WebLogic Administration Console
Syntax Requirements for GAUTHSVR Configuration File
GAUTHSVR Configuration File Keywords
Example GAUTHSVR Configuration File
Using tpmigldif Command Line Options
Assigning New Passwords for the tpusr File (Optional)