Security and Middleware
So far middleware security has been centralized and host based
- Security has been enforced outside middleware
- User credentials are passed directly to legacy systemsfor authentication and access control decisions
- Encrypted network traffic is provided with SSL
New business logic is implemented in the middleware
- distribution becomes reality also on the middletier
- the need for distributed security architectures rises