![]() |
![]() |
|
|
How Security Is Provided for the TEDG Network Connection
The TEDG network connection to the BEA TOP END system is the final element of end-to-end security with the TEDG. If security is configured in the BEA TOP END system, this connection is authenticated based on the BEA TOP END internode security protocol and the credentials installed for the system in the srvtab file. Additionally, based on the configuration level of the TEDG and the BEA TOP END system, link-level encryption is provided for messages passed through the link based on the BEA TOP END internode security protocol. BEA Tuxedo link encryption protocols are not used for the TEDG.
See Also
![]() |
![]() |
|
Copyright © 2001 BEA Systems, Inc. All rights reserved.
|