SlideShare a Scribd company logo
1 of 2
Active Matrix Policy Director
Unit 1 lntroducing TlBCO Active Matrix Policy Director
Introducing TIBCO ActiveMatrixPolicy Director
TIBCO Web Messaging: Reduced Latency
Core Components.
Distribution Engine.
Policy Agents
Installation and Configuration
Startup and Verification.
Using Proxy Agent for External Services.
Registering an External Service
Proxy Application
Testing A Proxy Service
Unit 2 Defining Policies
Understanding Obiect Groups
Defining an Obiect Group
Comleting an Obiect Group Definition
Policy: Definition Policy Templates
Steps to Define a Policy
Logging Policy
Install: Logging Applications
Creating a Logging Policy
Viewlog Utility
Unit 3 Authentication Policies
Securing Message Exchanges
Defining an Authentication Policy
Walking the LDAP Tree
Activating & Deactivating a Policy
Basic Authentication
Viewing Authentication Details
Unit 4 Business Works Governance Agent
BusinessWorks Agent
BusinessWorks Agent Installation
Post Installation
Governance Agent Configuration
Governance Agent Startup
Agent Log
Unit 5 Encryption and Digital Signatures
Defining a Keystore
Kevstores in AMX
Encrvution and Decrvution
Value Proposition

More Related Content

Similar to Tl bco activematrix policy director online training

Enterprise Library 3.0 Policy Injection Applicatoin Block
Enterprise Library 3.0 Policy Injection Applicatoin BlockEnterprise Library 3.0 Policy Injection Applicatoin Block
Enterprise Library 3.0 Policy Injection Applicatoin Blockmcgurk
 
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...IJNSA Journal
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsEnergySec
 
Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...
Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...
Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...Prolifics
 
NIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationFIDO Alliance
 
OpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoringOpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoringwwwally
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...YouAttestSlideshare
 
Stop reinventing the wheel with Istio by Mete Atamel (Google)
Stop reinventing the wheel with Istio by Mete Atamel (Google)Stop reinventing the wheel with Istio by Mete Atamel (Google)
Stop reinventing the wheel with Istio by Mete Atamel (Google)Codemotion
 
Asset-management-blockchain-solution-2019
Asset-management-blockchain-solution-2019Asset-management-blockchain-solution-2019
Asset-management-blockchain-solution-2019Saasvaap
 
Anypoint API Manager Custom Policies & Best Practices
Anypoint API Manager Custom Policies & Best PracticesAnypoint API Manager Custom Policies & Best Practices
Anypoint API Manager Custom Policies & Best PracticesMuleSoft Meetups
 
Inside the Cato Networks Management Console
Inside the Cato Networks Management ConsoleInside the Cato Networks Management Console
Inside the Cato Networks Management ConsoleDavid Greenfield
 
Istio: Using nginMesh as the service proxy
Istio: Using nginMesh as the service proxyIstio: Using nginMesh as the service proxy
Istio: Using nginMesh as the service proxyLee Calcote
 
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...Alan Yau Ti Dun
 
IBM Blockchain Labs Explained v1.0
IBM Blockchain Labs Explained v1.0IBM Blockchain Labs Explained v1.0
IBM Blockchain Labs Explained v1.0Matt Lucas
 
Lending qb executive summary 2013
Lending qb executive summary 2013Lending qb executive summary 2013
Lending qb executive summary 2013Gigi Campbell
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxdewhirstichabod
 
SOC Certification Runbook Template
SOC Certification Runbook TemplateSOC Certification Runbook Template
SOC Certification Runbook TemplateMark S. Mahre
 
Security Readiness Profile
Security Readiness ProfileSecurity Readiness Profile
Security Readiness Profilepds2k.com
 

Similar to Tl bco activematrix policy director online training (20)

Enterprise Library 3.0 Policy Injection Applicatoin Block
Enterprise Library 3.0 Policy Injection Applicatoin BlockEnterprise Library 3.0 Policy Injection Applicatoin Block
Enterprise Library 3.0 Policy Injection Applicatoin Block
 
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...
Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...
Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...
 
NIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO Authentication
 
OpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoringOpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoring
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
 
Stop reinventing the wheel with Istio by Mete Atamel (Google)
Stop reinventing the wheel with Istio by Mete Atamel (Google)Stop reinventing the wheel with Istio by Mete Atamel (Google)
Stop reinventing the wheel with Istio by Mete Atamel (Google)
 
Asset-management-blockchain-solution-2019
Asset-management-blockchain-solution-2019Asset-management-blockchain-solution-2019
Asset-management-blockchain-solution-2019
 
Anypoint API Manager Custom Policies & Best Practices
Anypoint API Manager Custom Policies & Best PracticesAnypoint API Manager Custom Policies & Best Practices
Anypoint API Manager Custom Policies & Best Practices
 
Inside the Cato Networks Management Console
Inside the Cato Networks Management ConsoleInside the Cato Networks Management Console
Inside the Cato Networks Management Console
 
Block Chain.pptx
Block Chain.pptxBlock Chain.pptx
Block Chain.pptx
 
Istio: Using nginMesh as the service proxy
Istio: Using nginMesh as the service proxyIstio: Using nginMesh as the service proxy
Istio: Using nginMesh as the service proxy
 
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
 
IBM Blockchain Labs Explained v1.0
IBM Blockchain Labs Explained v1.0IBM Blockchain Labs Explained v1.0
IBM Blockchain Labs Explained v1.0
 
The user s identities
The user s identitiesThe user s identities
The user s identities
 
Lending qb executive summary 2013
Lending qb executive summary 2013Lending qb executive summary 2013
Lending qb executive summary 2013
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
SOC Certification Runbook Template
SOC Certification Runbook TemplateSOC Certification Runbook Template
SOC Certification Runbook Template
 
Security Readiness Profile
Security Readiness ProfileSecurity Readiness Profile
Security Readiness Profile
 

More from Mindmajix Technologies

More from Mindmajix Technologies (14)

Oracle scm
Oracle scmOracle scm
Oracle scm
 
Sap is retail
Sap is retailSap is retail
Sap is retail
 
Sap security
Sap securitySap security
Sap security
 
Best Data stage online training institute
Best Data stage online training instituteBest Data stage online training institute
Best Data stage online training institute
 
oracle Peoplesoft hrms technical online training
oracle Peoplesoft hrms technical online trainingoracle Peoplesoft hrms technical online training
oracle Peoplesoft hrms technical online training
 
Best Oracle r12 technical online training institute
Best Oracle r12 technical online training instituteBest Oracle r12 technical online training institute
Best Oracle r12 technical online training institute
 
Best Oracle hrms online training
Best Oracle hrms online trainingBest Oracle hrms online training
Best Oracle hrms online training
 
Best Oracle dba online training institute
Best Oracle dba online training instituteBest Oracle dba online training institute
Best Oracle dba online training institute
 
Best Oracle adf online training
Best Oracle adf online trainingBest Oracle adf online training
Best Oracle adf online training
 
Best Qlik view online training institute
Best Qlik view online training instituteBest Qlik view online training institute
Best Qlik view online training institute
 
Tibco business events (be) online training institute
Tibco business events (be) online training instituteTibco business events (be) online training institute
Tibco business events (be) online training institute
 
Best tibco activematrix soa online training
Best tibco activematrix soa online trainingBest tibco activematrix soa online training
Best tibco activematrix soa online training
 
Sales force development course content
Sales force development course contentSales force development course content
Sales force development course content
 
Introduction to integration
Introduction to integrationIntroduction to integration
Introduction to integration
 

Tl bco activematrix policy director online training

  • 1. Active Matrix Policy Director Unit 1 lntroducing TlBCO Active Matrix Policy Director Introducing TIBCO ActiveMatrixPolicy Director TIBCO Web Messaging: Reduced Latency Core Components. Distribution Engine. Policy Agents Installation and Configuration Startup and Verification. Using Proxy Agent for External Services. Registering an External Service Proxy Application Testing A Proxy Service Unit 2 Defining Policies Understanding Obiect Groups Defining an Obiect Group Comleting an Obiect Group Definition Policy: Definition Policy Templates Steps to Define a Policy Logging Policy Install: Logging Applications Creating a Logging Policy Viewlog Utility Unit 3 Authentication Policies Securing Message Exchanges Defining an Authentication Policy Walking the LDAP Tree Activating & Deactivating a Policy Basic Authentication Viewing Authentication Details Unit 4 Business Works Governance Agent BusinessWorks Agent BusinessWorks Agent Installation
  • 2. Post Installation Governance Agent Configuration Governance Agent Startup Agent Log Unit 5 Encryption and Digital Signatures Defining a Keystore Kevstores in AMX Encrvution and Decrvution Value Proposition