Security Capabilities
Security Capabilities
The Besty Media LLC system of Glamstyles4u can enforce security in a number of ways, which includes using the security features of the host operating system to control access to files, directories, and system resources. The following table describes the security capabilities available with the Besty Media system.
Besty Media Security Capabilities
Security Capability |
Description |
Plug-in Interface |
Default Implementation |
---|---|---|---|
Controls access to files, directories, and system resources. |
N/A |
N/A |
|
Proves the stated identity of users or system processes; safely remembers and transports identity information; and makes identity information available when needed. |
Implemented as a single interface |
The default authentication plug-in provides security at three levels: no authentication, application password, and user-level authentication. This plug-in works the same way the BEA Tuxedo implementation of authentication has worked since it was first made available with the BEA Tuxedo system. |
|
Controls access to resources based on identity or other information. |
Implemented as a single interface |
The default authorization plug-in provides security at two levels: optional access control lists and mandatory access control lists. This plug-in works the same way the BEA Tuxedo implementation of authorization has worked since it was first made available with the BEA Tuxedo system. |
|
Safely collects, stores, and distributes information about operating requests and their outcomes. |
Implemented as a single interface |
Default auditing security is implemented by the BEA Tuxedo EventBroker and userlog (ULOG) features. |
|
Uses symmetric key encryption to establish data privacy for messages moving over the network links that connect the machines in a BEA Tuxedo application. |
N/A |
RC4 symmetric key encryption. |
|
Uses public key (or asymmetric key) encryption to establish end-to-end digital signing and data privacy between BEA Tuxedo application clients and servers. Complies with the PKCS-7 standard. |
Default public key security supports the following algorithms:
|