Tag Archives: Best Practices

MQ Password/CHLAUTH research – Exec Summary

As of v8.0, MQ now can natively validate user IDs by checking the password against the Operating System or LDAP.  Checking against Pluggable Authentication Module (PAM) was added in v8.0.0.4.  Prior to v8.0 it was necessary to use a channel … Continue reading

Posted in Security, WMQ, WMQ Security | Tagged , , , , , | 4 Comments

News and updates

This is a quick note to tell folks a bit about my virtual absence of late, current events and plans for what’s coming up. Whatever happened to… I’m not exactly a candidate for VH1’s Where Are They Now but I … Continue reading

Posted in Events, News, Security, WMQ, WMQ Security | Tagged , , , , , , , , , , , | Leave a comment

MQTC Sessions and downloads posted

My sessions and downloadable scripts from MQTC 2.0.15 are now up on the Links page.

Posted in Events, MQTC, News, Security, WMQ, WMQ Security | Tagged , , , , , , , | Leave a comment

Are messaging hubs an anti-pattern?

I have worked over the last decade with many customers who were consolidating their MQ footprint. It’s a familiar pattern – there are many queue managers, they tend to be lightly loaded, why not consolidate to a central hub? Now … Continue reading

Posted in General, WMQ | Tagged , , , , | 4 Comments

Zero to SSL in under 5 Minutes

A viewer of the Zero to Hello World video recently challenged me to do a similar video for SSL. Challenge accepted!

Posted in Security, WMQ, WMQ Security | Tagged , , , , , , , , | Leave a comment

Spring Cleaning a Windows MQ Installation

If you have ever attended one of my conference sessions, read my articles, or hired me to perform any kind of MQ work, then you know that I consider SupportPac MS0P to be an indispensable add-on for MQ Explorer.  I … Continue reading

Posted in WMQ | Tagged , , , , , , , | 3 Comments

IBM MQ Security Requirements Questionnaire

Over the years I have often been asked for security templates and other canned assets to help make MQ security planning, implementation, and operation easier. These often become the source material for conference presentations, articles and videos.  Some of these … Continue reading

Posted in Security, WMQ, WMQ Security | Tagged , , , , , , , , | 1 Comment