Security in a High Availability Environment

When you install the TIBCO iProcess® Web Services Server Plug-in, in addition to installing Jetty on each server, you should specify the location of the keystore and also configure Secure Socket Layer (SSL) encryption on each server if desired (see Task F - Configure the Server). This may be necessary, for example, if your keystore generates a unique certificate for each host.

Inbound Security

Inbound security (external applications calling the iProcess Web Services located on your server) is implemented by an Axis2 service. The service is deployed to Axis2 in the form of an .aar archive file as described in Inbound Security and Deployment.

In a High Availability environment, there may be several Jetty installations across multiple hosts. If you modify the Inbound Web Service security profile, you must restart Jetty on each host. On startup, the Inbound Web Service is redeployed.