(Chapter 24, section 1)
In this section, we will discuss the roles required to access the relevant run time tools. We will look at how various sets of permissions acting on clusters of composite applications can be withheld or granted. Finally we discuss how to hide sensitive pieces of information from administrator’s eyes through encryption.
The sources for this section are found in folder ch24.
Service Bus – Access Security
SCA runtime Securing Access to Partitions