4.3.2 Built-in Tuxedo Security

Built-in Tuxedo security is used when custom security plug-ins are not implemented.

To enable the built-in Tuxedo security feature, complete the following tasks.

  1. Code SECURITY in the Oracle Tuxedo UBBCONFIG file. Refer to the Oracle Tuxedo Administration Guide for more information.
  2. Set up user, group, and ACL files. Refer to the Oracle Tuxedo Administrator’s Guide for more information.

    Note:

    The user information in these files must match in the Oracle Tuxedo and the mainframe environments or a security violation occurs.
  3. Code the security parameter in your TMA TCP Gateway configuration file (GWICONFIG). For GWICONFIG syntax and parameter definitions, refer to the Configuring Oracle TMA TCP Gateway