For an overview and understanding
of security for the SAS Open Metadata Architecture, see the
SAS Intelligence Platform: Security Administration Guide.
The IOM Bridge for Java has the
ability to encrypt all messages exchanged with the IOM server by using
a two-tiered security solution. The first tier is a SAS proprietary
encryption algorithm. The second tier contains standards-based RC2,
RC4, DES, and Triple DES encryption algorithms.
The SAS proprietary
encryption algorithm (SASPROPRIETARY) is appropriate to use when you
want to prevent accidental exposure of information while it is being
transmitted over a network between an IOM Bridge for Java and an IOM server.
Access to this encryption algorithm is included with your Base SAS
license, and the Java implementation is integrated into the IOM Bridge
for Java.
The second-tier encryption
algorithms are appropriate to use when you want to prevent exposure
of secret information. In other words, using these algorithms makes
it extremely difficult to discover the content of messages exchanged
between an IOM Bridge for Java and an IOM server. To use these algorithms
you must license
SAS/SECURE software.
In addition
to encryption,
SAS/SECURE software also supports message authentication
codes (MAC). A MAC is a few bytes of information that is appended
to a message to allow the receiver to confirm that the message has
not been altered in transit.
Instructions for the
security features of the IOM Bridge for Java are included with the
documentation for the
com.sas.services.connection
class. Those instructions contain some tips on how to configure
the IOM server, but more complete information is available in the
documentation for Base SAS software. Installation instructions and
usage information for second-tier encryption algorithms is provided
in the documentation for
SAS/SECURE software.