Because a true security implementation depends on the use of an external centralised security provider to define identities and authorizations, this samples does not implement security enforcement. In this section you can learn how to extend the sample to incorporate security enforcement using your own security provided, for example an LDAP server.
You can extend the sample to work with an LDAP server by completing the following tasks:
For instructions, see Setting up message flow security and Message flow security in the IBM Integration Bus documentation.