Implementing Additional Business Process Security

In addition to the native security features that are supported by the transports underlying your endpoint connections, you can also implement the following security directly into the flow of your business process service, using the SecurityService provided in the Service Explorer:

The following workflow guides you through the implementation process.

  1. Complete the setup.

  2. Determine the security mechanism that you want to implement. Choose from the following:

Send your feedback on this help topic to Sybase Tech Pubs: pubs@sybase.com