Determine your security goal and then complete the associated setup procedure before you add SecurityServices to a business process.
Security Setup Options
| Goal | Procedure | Reference | 
|---|---|---|
| Secure access to a business process service | Choose from the following: 
 
  | 
 
 
  | 
| Encrypt data flowing through a business process service | Configure security profiles using the Security Console contained in the Runtime Management Console.  | See the Runtime Management Console online help for more information.  | 
Send your feedback on this help topic to Sybase Tech Pubs: pubs@sybase.com