In addition to the native security features that are supported by the transports underlying your endpoint connections, you can also implement the following security directly into the flow of your business process service, using the SecurityService provided in the Service Explorer:
User authorization
User authentication
Data encryption protection
Data decryption
The following workflow guides you through the implementation process.
Determine the security mechanism that you want to implement. Choose from the following:
Send your feedback on this help topic to Sybase Tech Pubs: pubs@sybase.com