Granting required access to resources

Use this topic to determine what tasks to perform to apply security to your IBM® MQ system.

About this task

During this task, you decide what actions are necessary to apply the appropriate level of security to the elements of your IBM MQ installation. Each individual task you are referred to gives step-by-step instructions for all platforms.

Procedure

  1. Do you need to limit access to your queue manager to certain users?
    1. No: Take no further action.
    2. Yes: Go to the next question.
  2. Do these users need partial administrative access on a subset of queue manager resources?
    1. No: Go to the next question.
    2. Yes: See Granting partial administrative access on a subset of queue manager resources.
  3. Do these users need full administrative access on a subset of queue manager resources?
    1. No: Go to the next question.
    2. Yes: See Granting full administrative access on a subset of queue manager resources.
  4. Do these users need read only access to all queue manager resources?
    1. No: Go to the next question.
    2. Yes: See Granting read-only access to all resources on a queue manager.
  5. Do these users need full administrative access on all queue manager resources?
    1. No: Go to the next question.
    2. Yes: See Granting full administrative access to all resources on a queue manager.
  6. Do you need user applications to connect to your queue manager?
    1. No: Disable connectivity, as described in Removing connectivity to the queue manager
    2. Yes: See Allowing user applications to connect to your queue manager.