Middle-Tier Security

To determine how to implement middle-tier security, you should consider your organization's internal security policies, the security mechanisms that are in place in your environment, the types of users who need to access the Web applications, and the types of content that you plan to make available.
Important concepts and tasks concerning middle-tier security are as follows: