Web Search

TIBCO® Object Service Broker
Important Information
Preface
Related Documentation
Typographical Conventions
Connecting with TIBCO Resources
Aspects of TIBCO Object Service Broker Security
What is TIBCO Object Service Broker Security?
The Security Manager Facility
Accessing the Security Manager
Security Roles within the Security Manager
Security Clearances
Login Clearance
Object-Level Clearance
Managing User Profiles
Creating and Accessing a User Profile
Setting Operational Options
Setting Login Options
Setting Print Options
Setting Application Development Options
Saving and Deleting a User Profile
Creating Multiple User IDs
Managing Security Administrator Profiles
Creating and Accessing a Security Administrator Profile
Specifying Security Administrator Privileges
Obtaining Security Administrator Subjects
Removing Subjects From the Subjects List
Deleting a Security Administrator Profile
Managing Security Groups
Accessing Security Groups
Creating a Security Group
Viewing Security Group Information
Managing Permissions to Objects
Ownership Privileges and Permissions
Setting up Explicit Permissions to Objects
Task A: Identify an Object
Task B: Identify Table Instances
Task C: Modify the Classification Level
Task D: Logging Accesses to a Table
Task E: Set Accesses
Modifying Permissions
Transferring Ownership of Objects
Setting Up Default Permissions
Creating and Accessing a Default Permissions List
Adding and Updating Default Permissions for Objects
Managing Object Set Security
Security for Object Sets
Object Set Permissions
Enabling and Disabling Object Sets
Auditing Accesses
Auditing the Use of TIBCO Object Service Broker
Accessing the Audit Log Facility
Querying the Data
Creating, Editing, and Deleting Filters
Initiating a Reporting Session
Archiving the Audit Log Data
Archiving the Audit Log–z/OS
Archiving the Audit Log–Open Systems
Purging the Archive File Interactively
Purging the Archive File in Batch
Analyzing Archived Data
Bound Security Access Data
Binding of Security Access Data
Monitoring Security Performance
Password Encryption API
Overview
Encryption API for z/OS
Encryption API for Open Systems
Changing the Encryption Algorithm
Implementing External Security
Overview
Defining Data Object Broker Access
Defining User Validation