<!doctype html>
<html>
 <head> 
  <title>Principles of Security</title> 
  <link rel="stylesheet" href="styles/site.css" type="text/css"> 
  <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> 
  <link rel="stylesheet" href="styles/icons.css" type="text/css">
  <script src="js/jquery.min.js"></script>
  <script src="tree/collapsibleTreeMenu.js"></script>
  <link href="tree/collapsibleTreeMenu.css" rel="stylesheet" type="text/css">
 </head> 
 <body class="theme-default aui-theme-default"> 
  <div id="page"> 
   <div id="main" class="aui-page-panel"> 
    <div id="main-header"> 
     <div id="breadcrumb-section"> 
      <ol id="breadcrumbs">  
       <li> <span><a href="Rhapsody-Integration-Engine-6.5_133160975.html">Rhapsody Integration Engine 6.5</a></span> </li> 
       <li> <span><a href="Administering-Rhapsody_133160982.html">Administering Rhapsody</a></span> </li> 
       <li> <span><a href="Security-Provisions_133161176.html">Security Provisions</a></span> </li> 
      </ol> 
     </div> 
     <h1 id="title-heading" class="pagetitle"> <span id="title-text">Principles of Security</span> </h1> 
    </div> 
    <div id="content" class="view">  
     <div id="main-content" class="wiki-content group"> 
      <p class="p"><span style="line-height: 13.0pt;">You can use Rhapsody for a wide variety of applications on a range of platforms. For some applications, security is a critical consideration, for example the transmission of sensitive data such as Patient Healthcare Information.&nbsp;</span><span style="line-height: 13.0pt;background-color: transparent;">There are three primary aspects to security within a Rhapsody environment:</span><span style="line-height: 13.0pt;background-color: transparent;"><span style="line-height: 13.0pt;background-color: transparent;">&nbsp;</span></span></p>
      <ul>
       <li class="p"><span style="line-height: 13.0pt;">Securing access to administration, monitoring and development of the Rhapsody Engine.&nbsp;</span></li>
       <li class="p"><span style="line-height: 13.0pt;">Securing communications between Rhapsody and external systems in a configured deployment.</span></li>
       <li class="p"><span style="line-height: 13.0pt;background-color: transparent;">Security hardening of the environment Rhapsody is deployed in.&nbsp;</span></li>
      </ul>
      <p class="p"><span style="line-height: 13.0pt;background-color: transparent;">To protect its resources, Rhapsody provides the following security services:</span></p>
      <p class="p"></p>
      <ul class="childpages-macro">
       <li><a href="Identification-and-Authentication_133161182.html">Identification and Authentication</a></li>
       <li><a href="Access-Control_133161181.html">Access Control</a></li>
       <li><a href="Confidentiality_133161180.html">Confidentiality</a></li>
       <li><a href="Data-Integrity_133161179.html">Data Integrity</a></li>
       <li><a href="Non-repudiation_133161178.html">Non-repudiation</a></li>
      </ul>
      <p></p>
      <p class="p">When you are planning a Rhapsody implementation, you need to consider which security services and mechanisms you require.</p>
      <p> </p> 
     </div> 
    </div> 
   </div>  
  </div>   
 </body>
</html>