Regarding Moriti’s comments:
Because digital certs are strictly for authentication (and not for encryption), it is not required to use them between the two B2B servers in your architecture. The digital certs will only confirm that the initiating machine is who it says that it is.
There is no way to make your system 100% secure, but there are certainly lots of measures that you can take to reduce the likelihood of a hacked system.
As Michael Farrell wrote:
"Your goal in the Security World is to do two things:
- Do everything possible to reduce the chances of getting hacked
- Minimize the exposure and possible damage that a hacker could do if it did reach a machine."
The first point is obvious, he writes, but the second is often ignored.
He lists these precautionary measures:
"Don’t put anything else on the machine in question. That includes files, databases and applications.
"Don’t give accounts on the machine to people that don’t need it. And even then, make sure that the people really need it.
“Don’t allow the machine to have privileges to communicate with any other box other than ones that are needed for the machine’s primary function. And even then, make sure that the other box is needed for the machine’s primary function.”
Joss makes some great points about SSLSOCK connections and the relative speed of connections of that type versus the benefits. However, each integration has its own personality and you may find that none of the solutions in this thread fit your plan.
For more information on these topics, webMethods Advantage (http://www.advantage.com) has some materials on security, IP Deny, and other built-in features of the webMethods B2B Server/Integration Server software.
#webMethods#webMethods-Architecture#webMethods-General#Integration-Server-and-ESB