File APIs for Java Developers
Manipulate DOC, XLS, PPT, PDF and many others from your application.
The moose likes Architect Certification (SCEA/OCMJEA) and the fly likes JMS behind firewall Big Moose Saloon
  Search | Java FAQ | Recent Topics | Flagged Topics | Hot Topics | Zero Replies
Register / Login
JavaRanch » Java Forums » Certification » Architect Certification (SCEA/OCMJEA)
Bookmark "JMS behind firewall" Watch "JMS behind firewall" New topic

JMS behind firewall

Usman Ibrahim
Ranch Hand

Joined: May 19, 2011
Posts: 45

Have anyone tried to send JMS message to an external JMS queue from behind a company firewall. What if your firewall does not support http tunnelling? Can anyone share your thoughts and experience if you have come acros this.

Many thanks


OCMJEA; OCA (11g dba); SCJP
Jeanne Boyarsky
author & internet detective

Joined: May 26, 2003
Posts: 33102

Is this question about the OCMJEA exam or in general? If the later, I'll move your question to the JEE forum.

[OCA 8 book] [Blog] [JavaRanch FAQ] [How To Ask Questions The Smart Way] [Book Promos]
Other Certs: SCEA Part 1, Part 2 & 3, Core Spring 3, TOGAF part 1 and part 2
Usman Ibrahim
Ranch Hand

Joined: May 19, 2011
Posts: 45
certainly, its related to the SCEA part II and any answers would guide me in writing assumptions.
Arnold Reuser
Ranch Hand

Joined: Nov 20, 2003
Posts: 196
This issue could be related to the assignment of part II.
To resolve this issue you could have a look at the book Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management.
From a security viewpoint, a JMS-based application security solution requires support for authentication, authorization, encryption, confidentiality, data integrity, and non-repudiation.
Most messaging vendors provide support for some of these features:
* JMS provider authentication and access control
* JMS queues protection so that the destinations are available for access to privileged applications
* JMS message and transport security

The JMS specification does not address the choice of protocols to transport JMS messages.
To secure JMS transport, most providers facilitate secure communication by adopting transport-layer integrity and confidentiality mechanisms based on SSL/TLS protocols.
These transport-specific properties are configured at the JMS provider level and are applied to communication during the creation of the JMS connection

I agree. Here's the link:
subject: JMS behind firewall
It's not a secret anymore!