Close

Controlling Access to your IBM MQ System

(7F)

Stream: Virtual Room 7
Time: 09:00 - 10:00


Presentation

Security is applied in layers, and IBM MQ provides all the layers that you need to ensure complete security of the system and the data within it. In this session we'll focus on the different ways to authenticate and authorize users and applications, and how different environments promote different approaches, ranging from the traditional OS users, through centralized LDAP through to mutual TLS.

Attachments

7F Attachments

Speakers


  • Gwydion Tudur at IBM UK LTD.
  • Gwydion is a software engineer working in the IBM MQ development team, specialising in the z/OS platform. He has over 10 years of experience designing and developing new features in IBM MQ and supporting MQ customers.


    Email: GTUDUR1@uk.ibm.com

  • Gwydion Tudur at IBM UK LTD.
  • Gwydion is a software engineer working in the IBM MQ development team, specialising in the z/OS platform. He has over 10 years of experience designing and developing new features in IBM MQ and supporting MQ customers.


    Email: GTUDUR1@uk.ibm.com

  • Gwydion Tudur at IBM UK LTD.
  • Gwydion is a software engineer working in the IBM MQ development team, specialising in the z/OS platform. He has over 10 years of experience designing and developing new features in IBM MQ and supporting MQ customers.


    Email: GTUDUR1@uk.ibm.com

  • Gwydion Tudur at IBM UK LTD.
  • Gwydion is a software engineer working in the IBM MQ development team, specialising in the z/OS platform. He has over 10 years of experience designing and developing new features in IBM MQ and supporting MQ customers.


    Email: GTUDUR1@uk.ibm.com

    Feedback

    Click here to give some Feedback so we can make it even better next year!