Defense against attacks

This section discusses some of the methods by which you can protect data and restrict access to resources.

Protecting ports and listeners You can provide various levels of security to EAServer listeners by assigning security profiles to HTTPS and IIOPS listeners. See Chapter 13, “Security Configuration Tasks” for more information.

Protecting application server resources and securing clients EAServer provides several methods to protect server resources and secure client/server connections:

Protecting data Use public-key certificates when exchanging sensitive data over a network to protect it from being viewed by intruders. See Chapter 14, “Managing Keys and Certificates” for more information.