Java Clients
Java Client SecurityFor an overview and understanding of security for the SAS Open Metadata Architecture, see Security in the SAS Integration Technologies: Server Administrator's Guide. The IOM Bridge for Java has the ability to encrypt all messages exchanged with the IOM server, using a two-tiered security solution. The first tier is a SAS proprietary encryption algorithm. The second tier is made up of standards-based RC2, RC4, DES, and Triple DES encryption algorithms. The SAS proprietary encryption algorithm (SASPROPRIETARY) is appropriate for use in applications where you want to prevent accidental exposure of information while it is being transmitted over a network between an IOM Bridge for Java and an IOM server. Access to this encryption algorithm is included with your Base SAS license, and the Java implementation is integrated into the IOM Bridge for Java. The second-tier encryption algorithms are appropriate for use in applications where you want to prevent exposure of secret information. In other words, using these algorithms makes it extremely difficult to discover the content of messages exchanged between an IOM Bridge for Java and an IOM server. To use these algorithms you must license SAS/SECURE software. In addition to encryption, SAS/SECURE software also supports message authentication codes (MAC). A MAC is a few bytes of information that is appended to a message to allow the receiver to be sure that the message has not been altered in transit. Usage instructions for the security features of the IOM Bridge for Java are included with the documentation for the |