Message channel agents (MCAs) are WebSphere MQ applications and need access to various WebSphere MQ resources.
The PUTAUT parameter of the channel definition specifies which user ID is used for these checks.
The user ID associated with the MCA depends on the type of MCA.
WebSphere MQ channels, channel initiators, and listeners are not WebSphere MQ objects; access to them is not controlled by the OAM. WebSphere MQ does not allow users or applications to manipulate these objects, unless their user ID is a member of the mqm group. If you have an application that issues the PCF commands listed below, the user ID specified in the message descriptor of the PCF message must be a member of the mqm group on the target queue manager.
A user ID must also be a member of the mqm group on the target machine to issue the equivalent MQSC commands through the Escape PCF command or using runmqsc in indirect mode.
Queue managers automatically put remote messages on a transmission queue; no special authority is required for this. However, putting a message directly on a transmission queue requires special authorization; see Table 10.
You can use channel exits for added security. A security exit forms a secure connection between two security exit programs, where one program is for the sending message channel agent (MCA), and one is for the receiving MCA.
On WebSphere MQ for Windows, there is a security exit for both the WebSphere MQ client and the WebSphere MQ server. This is a channel exit program that provides authentication for WebSphere MQ channels by using the Security Services Programming Interface (SSPI). The supplied channel exit programs provide either one-way or two-way (mutual) authentication of a partner system when a session is being established. For a particular channel, each exit program has an associated principal. A connection between two exit programs is an association between the two principals.
The exit source code file is called amqsspin.c, and is stored in the C:\Program files\IBM\WebSphere MQ\tools\c\samples directory. If you modify the source code, you must recompile the modified source. The source code does not include any provision for tracing or error handling. If you choose to modify and use the source code, add your own tracing and error-handling routines. You compile and link the file in the same way as any other channel exit, except that SSPI headers need to be accessed at compile time, and SSPI libraries need to be accessed at link time. See WebSphere MQ for Windows, V5.3 Quick Beginnings for more information.
See WebSphere MQ Intercommunication for more information about channel exits.
The Secure Sockets Layer (SSL) protocol provides out of the box channel
security, with protection against eavesdropping, tampering, and
impersonation. WebSphere MQ support for SSL enables you to specify, on
the channel definition, that a particular channel uses SSL security.
You can also specify details of the kind of security you want, such as the
encryption algorithm you want to use.
SSL support in WebSphere MQ uses the queue manager authentication
information object, authinfo, and various MQSC commands and queue
manager and channel parameters that define the SSL support required in
detail.
The following MQSC commands support SSL:
The following channel parameters support SSL:
This book describes changes to the setmqaut, dspmqaut,
dmpmqaut, rcrmqobj, rcdmqimg, and
dspmqflscommands to support the SSL authentication information
object, authinfo. It also describes the amqmcert
command for managing certificates. See the following sections:
For an overview of channel security using SSL, see WebSphere MQ Security.
For details of the new commands and the new channel and queue manager
attributes, see the WebSphere MQ Script (MQSC) Command
Reference.
For details of PCF commands associated with SSL, see WebSphere MQ Programmable Command Formats and Administration
Interface.Protecting channels with SSL
The following queue manager parameters support SSL: