BEA Home | Events | Solutions | Partners | Products | Services | Download | Developer Center | WebSUPPORT
http://www.oracle.com/technology/documentation/index.html | Site Map | Search | PDF Files | Contact | Glossary
Tuxedo Documentation | Using Security in ATMI Applications | Local Topics | Previous Topic | Next Topic | Contents
Programming an ATMI Application with Security
The BEA Tuxedo system offers various ATMI functions for different security needs.
If You Are Writing Security Code for . . .
Then You Use the ATMI Functions Available for . . .
Client programs so that clients can join a ATMI application and access application services.
Clients joining an ATMI application, which in turn invoke system-level calls to the authentication and authorization plug-ins.
Both client and server programs to protect the integrity and privacy of the data they exchange.
Public key security, which supports end-to-end digital signing and data encryption.
See Also
Copyright © 2001 BEA Systems, Inc. All rights reserved. Required browser: Netscape 4.0 or higher, or Microsoft Internet Explorer 4.0 or higher.