About Security Configuration on the JMS Server

For information about how to protect JMS resources on the JMS server, see the specific vendor documentation.