SlideShare a Scribd company logo
13
Most read
16
Most read
21
Most read
TechCon 2022
IBM MQ Token Based Authentication
Rob Parker
Security Architect, MQ Distributed
parrobe@uk.ibm.com
© 2022 IBM Corporation
IBM MQ | 30 Years of Innovation
Important Disclaimers
IBM’s statements regarding its plans, directions and intent are subject to
change or withdrawal without notice at IBM’s sole discretion. Information
regarding potential future products is intended to outline our general product
direction and it should not be relied on in making a purchasing decision. The
information mentioned regarding potential future products is not a
commitment, promise, or legal obligation to deliver any material, code or
functionality. Information about potential future products may not be
incorporated into any contract. The development, release, and timing of any
future features or functionality described for our products remains at our sole
discretion.
© Copyright IBM Corporation 2023. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. Any statement of direction represents IBM’s current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM and the IBM logo are
trademarks or registered trademarks of International Business Machines Corporation, in the United States and/or other countries. Other product and service names might be trademarks of
IBM or other companies. A current list of IBM trademarks is available on ibm.com/trademark.
2
© 2023 IBM Corporation
IBM MQ | 30 Years of Innovation
IBM Automation / June, 2023 / © 2023 IBM Corporation 3
What is JWT?
IBM MQ | 30 Years of Innovation
IBM MQ 9.3.4 – Token-based authentication
What is a token?
• A token is a simple structure that contains information
about a user and can easily be transferred between
parties over the internet.
• A JWT can be cryptographically signed to form a JWS.
This allows for the cryptographic verification of the
information inside the JWT.
• Authentication tokens that are used with IBM MQ must
• Be a valid JWT, as defined by internet standard RFC7519
• Be signed according to JSON Web Signature (JWS) internet
standard RFC7515, with an algorithm that IBM MQ supports
• Contain the required header parameters and payload claims.
• The token can contain a “user claim” that specifies the
user ID to be adopted.
{
"alg": "HS256",
"typ": "JWT"
}
{
"user": "user_id",
"exp": 1716239022,
"nbf": 1516239022
}
HMACSHA256(
base64UrlEncode(header) + "." +
base64UrlEncode(payload),
secret
)
Header
Payload
Signature
eyJhbGciOiJIUzI1NiIsInR5cCI6I
kpXVCJ9.eyJzdWIiOiIxMjM0NT
Y3ODkwIiwibmFtZSI6IkpvaG4
gRG9lIiwiZXhwIjoxNTE2MjM5
MDIyfQ.E9bQ6QAil4HpH825Q
C5PtjNGEDQTtMpcj0SO2W8v
mag
© 2023 IBM Corporation
IBM MQ | 30 Years of Innovation
IBM MQ | 30 Years of Innovation
https://jwt.io/
© 2023 IBM Corporation
Full spec
IBM MQ | 30 Years of Innovation
© 2023 IBM Corporation
IBM Confidential
Auth Server
IBM MQ | 30 Years of Innovation
© 2023 IBM Corporation
Benefits
IBM Confidential
Auth Server
IBM MQ | 30 Years of Innovation
Centralized Authentication
© 2023 IBM Corporation
IBM Confidential
Auth Server
Credentials only go to authentication server
Token
© 2023 IBM Corporation
IBM Confidential
Auth Server
IBM MQ | 30 Years of Innovation
Authenticate how you choose
Token
© 2023 IBM Corporation
IBM Confidential
Auth Server
Tokens contain information
Token
© 2023 IBM Corporation
• User
• Groups
• Authorizations
• Expiry
• Who issed
• etc
IBM MQ | 30 Years of Innovation
IBM Automation / June, 2023 / © 2023 IBM Corporation 12
How does JWT work in MQ?
IBM MQ | 30 Years of Innovation
IBM MQ 9.3.4 – Token-based authentication
From IBM MQ 9.3.4, client applications can provide
tokens to authenticate with a queue manager. The
queue manager must be configured to accept
authentication tokens.
• Token-based authentication is supported by queue managers
that run on AIX®, Linux®, and OpenShift® Container Platforms.
• IBM MQ MQI clients written in C present tokens on
connection and can be authenticated.
• The client application can run on any platform.
• Both IBM MQ MQI clients and Java clients can remain
unchanged and use security exits to send authentication
tokens to the queue manager.
© 2023 IBM Corporation
IBM MQ | 30 Years of Innovation
Auth Server
MQ Config
Keystore
Queue Manager
IBM MQ | 30 Years of Innovation
© 2023 IBM Corporation
Must be 12 characters or less
Identity adoption
IBM MQ | 30 Years of Innovation
© 2023 IBM Corporation
MQCNO cno = {MQCNO_DEFAULT};
MQCSP csp = {MQCSP_DEFAULT};
Char * Token;
...
cno.SecurityParmsPtr = &csp;
cno.Version = MQCNO_VERSION_5;
Token = myOAUthLogin(User,Pass);
csp.Version = MQCSP_VERSION_3;
csp.AuthenticationType = MQCSP_AUTH_ID_TOKEN;
csp.TokenPtr = Token;
csp.TokenLength = (MQLONG)strlen(Token);
MQCONNX(QMName,
&cno,
&Hcon,
&CompCode,
&Creason);
Application Changes
• C Clients
• Network bound
© 2023 IBM Corporation
Security exits
Auth Server
C
client App
SCYEXIT
SCYEXIT
IBM MQ | 30 Years of Innovation
© 2023 IBM Corporation
Security exits
Auth Server
Java/JMS
client App
SCYEXIT
IBM MQ | 30 Years of Innovation
© 2023 IBM Corporation
Demo?
© 2022 IBM Corporation
Notices and disclaimers
© 2023 International Business Machines Corporation.
All rights reserved.
This document is distributed “as is” without any warranty, either express or
implied. In no event shall IBM be liable for any damage arising from the use of
this information, including but not limited to, loss of data, business interruption,
loss of profit or loss of opportunity.
Customer examples are presented as illustrations of how those customers have
used IBM products and the results they may have achieved. Actual performance,
cost, savings or other results in other operating environments may vary.
Workshops, sessions and associated materials may have been prepared by
independent session speakers, and do not necessarily reflect the views of IBM.
Not all offerings are available in every country in which IBM operates.
Any statements regarding IBM’s future direction, intent or product plans are
subject to change or withdrawal without notice.
IBM, the IBM logo, and ibm.com are trademarks of International Business
Machines Corporation, registered in many jurisdictions worldwide. Other product
and service names might be trademarks of IBM or other companies. A current list
of IBM trademarks is available on the Web at “Copyright and trademark
information” at: www.ibm.com/legal/copytrade.shtml.
Certain comments made in this presentation may be characterized as forward
looking under the Private Securities Litigation Reform Act of 1995.
Forward-looking statements are based on the company’s current assumptions
regarding future business and financial performance. Those statements by their
nature address matters that are uncertain to different degrees and involve a
number of factors that could cause actual results to differ materially. Additional
information concerning these factors is contained in the Company’s filings with
the SEC.
Copies are available from the SEC, from the IBM website, or from IBM Investor
Relations.
Any forward-looking statement made during this presentation speaks only as of
the date on which it is made. The company assumes no obligation to update or
revise any forward-looking statements except as required by law; these charts
and the associated remarks and comments are integrally related and are
intended to be presented and understood together.
21
© 2023 IBM Corporation

More Related Content

PDF
Software requirements
PPTX
Introduction to Web Architecture
PPTX
Software Architecture Styles
PDF
Module 5-cloud computing-SECURITY IN THE CLOUD
PPT
IBM FileNet ECM Roadmap
PPTX
Migration into a Cloud
PPTX
Object oriented analysis &design - requirement analysis
PPTX
Software Crisis
Software requirements
Introduction to Web Architecture
Software Architecture Styles
Module 5-cloud computing-SECURITY IN THE CLOUD
IBM FileNet ECM Roadmap
Migration into a Cloud
Object oriented analysis &design - requirement analysis
Software Crisis

What's hot (20)

PPT
Resource provisioning optimization in cloud computing
PPTX
Identity and Access Management (IAM)
PPT
Cloud deployment models
PPTX
Case study of amazon EC2 by Akash Badone
PPTX
Software Maintenance
PPT
User Interface Design Chapter 2 Galiz
PPTX
User authentication
 
PPT
Pressman ch-3-prescriptive-process-models
PPTX
Kerberos : An Authentication Application
PPT
Slides chapters 26-27
PPT
Benefits of Cloud Computing
PDF
Lecture5 virtualization
PPT
Cloud computing
PPTX
Software Requirements
PPTX
Software review
PPT
Example of dfd with answer
PPTX
PPTX
Requirements analysis and modeling
PDF
Domain specific Software Architecture
PPTX
Software Configuration Management
Resource provisioning optimization in cloud computing
Identity and Access Management (IAM)
Cloud deployment models
Case study of amazon EC2 by Akash Badone
Software Maintenance
User Interface Design Chapter 2 Galiz
User authentication
 
Pressman ch-3-prescriptive-process-models
Kerberos : An Authentication Application
Slides chapters 26-27
Benefits of Cloud Computing
Lecture5 virtualization
Cloud computing
Software Requirements
Software review
Example of dfd with answer
Requirements analysis and modeling
Domain specific Software Architecture
Software Configuration Management
Ad

Similar to IBM MQ Token Authentication.pdf (20)

PDF
SHARE2016: DevOps - IIB Administration for Continuous Delivery and DevOps
PPTX
What's new in IBM MQ
ODP
2829 liberty
PPTX
IBM MQ on cloud and containers
PDF
Enterprise grade cloud services with data power virtual
PDF
Enterprise grade cloud services with data power virtual
PPT
The Bluemix Quadruple Threat
PPTX
World of Watson HandsOnLab
PDF
IBM i and digital transformation
PPT
IBM UrbanCode Deploy and VMware Integrated OpenStack
PPTX
MQ Light in IBM MQ: IBM Interconnect 2015 session AME4182
PPTX
WebSphere Liberty HTML5 Real-Time Features Lab
PPTX
Software Defined WebSphere Messaging Infrastructure with Puppet
PDF
Developing Integrations for IBM Integration Bus on Cloud
PDF
Codemotion Rome 2015 Bluemix Lab Tutorial
PDF
Exposing auto-generated Swagger 2.0 documents from Liberty!
PPTX
Session 2546 - Solving Performance Problems in CICS using CICS Performance A...
PDF
IBM Message Hub: Cloud-Native Messaging
PDF
Using bpm, mdm and odm to implement on boarding solutions for banking - sessi...
PDF
Simplifying IBM MQ Security in your MQ estate
SHARE2016: DevOps - IIB Administration for Continuous Delivery and DevOps
What's new in IBM MQ
2829 liberty
IBM MQ on cloud and containers
Enterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtual
The Bluemix Quadruple Threat
World of Watson HandsOnLab
IBM i and digital transformation
IBM UrbanCode Deploy and VMware Integrated OpenStack
MQ Light in IBM MQ: IBM Interconnect 2015 session AME4182
WebSphere Liberty HTML5 Real-Time Features Lab
Software Defined WebSphere Messaging Infrastructure with Puppet
Developing Integrations for IBM Integration Bus on Cloud
Codemotion Rome 2015 Bluemix Lab Tutorial
Exposing auto-generated Swagger 2.0 documents from Liberty!
Session 2546 - Solving Performance Problems in CICS using CICS Performance A...
IBM Message Hub: Cloud-Native Messaging
Using bpm, mdm and odm to implement on boarding solutions for banking - sessi...
Simplifying IBM MQ Security in your MQ estate
Ad

More from Robert Parker (20)

PDF
IBM MQ Whats new - up to 9.3.4.pdf
PPTX
IBM MQ Whats new - including 9.3 and 9.3.1
PPTX
Controlling access to your IBM MQ System
PPTX
531: Controlling access to your IBM MQ system
PPTX
M08 protecting your message data in IBM MQ with encryption
PDF
MQ Guide France - IBM MQ and Containers
PDF
MQ Guide France - What's new in ibm mq 9.1.4
PDF
M14: MQ security deep dive ITC 2019
PDF
M10: How to implement mq in a containerized architecture ITC 2019
PDF
M11 - Securing your MQ environment. Integration technical conference 2019
PPT
Running IBM MQ in the Cloud
PPT
Running IBM MQ in Containers
PPT
Securing your IBM MQ environment.
PPTX
IBM MQ in Containers - Think 2018
PPT
IBM MQ Security Overview MQTC 2017
PPTX
IBM MQ in containers MQTC 2017
PPTX
Planning for MQ in the cloud MQTC 2017
PPT
IBM MQ security deep dive including AMS MQTC 2017
PPTX
Deploying and managing IBM MQ in the Cloud
PPTX
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
IBM MQ Whats new - up to 9.3.4.pdf
IBM MQ Whats new - including 9.3 and 9.3.1
Controlling access to your IBM MQ System
531: Controlling access to your IBM MQ system
M08 protecting your message data in IBM MQ with encryption
MQ Guide France - IBM MQ and Containers
MQ Guide France - What's new in ibm mq 9.1.4
M14: MQ security deep dive ITC 2019
M10: How to implement mq in a containerized architecture ITC 2019
M11 - Securing your MQ environment. Integration technical conference 2019
Running IBM MQ in the Cloud
Running IBM MQ in Containers
Securing your IBM MQ environment.
IBM MQ in Containers - Think 2018
IBM MQ Security Overview MQTC 2017
IBM MQ in containers MQTC 2017
Planning for MQ in the cloud MQTC 2017
IBM MQ security deep dive including AMS MQTC 2017
Deploying and managing IBM MQ in the Cloud
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...

Recently uploaded (20)

PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
medical staffing services at VALiNTRY
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPTX
Introduction to Artificial Intelligence
PPTX
Essential Infomation Tech presentation.pptx
PDF
Understanding Forklifts - TECH EHS Solution
PPTX
ai tools demonstartion for schools and inter college
PPTX
history of c programming in notes for students .pptx
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Nekopoi APK 2025 free lastest update
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
top salesforce developer skills in 2025.pdf
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
Internet Downloader Manager (IDM) Crack 6.42 Build 41
medical staffing services at VALiNTRY
Odoo POS Development Services by CandidRoot Solutions
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
How Creative Agencies Leverage Project Management Software.pdf
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Introduction to Artificial Intelligence
Essential Infomation Tech presentation.pptx
Understanding Forklifts - TECH EHS Solution
ai tools demonstartion for schools and inter college
history of c programming in notes for students .pptx
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Nekopoi APK 2025 free lastest update
Operating system designcfffgfgggggggvggggggggg
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Reimagine Home Health with the Power of Agentic AI​
top salesforce developer skills in 2025.pdf
How to Choose the Right IT Partner for Your Business in Malaysia

IBM MQ Token Authentication.pdf

  • 1. TechCon 2022 IBM MQ Token Based Authentication Rob Parker Security Architect, MQ Distributed parrobe@uk.ibm.com © 2022 IBM Corporation IBM MQ | 30 Years of Innovation
  • 2. Important Disclaimers IBM’s statements regarding its plans, directions and intent are subject to change or withdrawal without notice at IBM’s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. © Copyright IBM Corporation 2023. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM’s current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM and the IBM logo are trademarks or registered trademarks of International Business Machines Corporation, in the United States and/or other countries. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on ibm.com/trademark. 2 © 2023 IBM Corporation IBM MQ | 30 Years of Innovation
  • 3. IBM Automation / June, 2023 / © 2023 IBM Corporation 3 What is JWT? IBM MQ | 30 Years of Innovation
  • 4. IBM MQ 9.3.4 – Token-based authentication What is a token? • A token is a simple structure that contains information about a user and can easily be transferred between parties over the internet. • A JWT can be cryptographically signed to form a JWS. This allows for the cryptographic verification of the information inside the JWT. • Authentication tokens that are used with IBM MQ must • Be a valid JWT, as defined by internet standard RFC7519 • Be signed according to JSON Web Signature (JWS) internet standard RFC7515, with an algorithm that IBM MQ supports • Contain the required header parameters and payload claims. • The token can contain a “user claim” that specifies the user ID to be adopted. { "alg": "HS256", "typ": "JWT" } { "user": "user_id", "exp": 1716239022, "nbf": 1516239022 } HMACSHA256( base64UrlEncode(header) + "." + base64UrlEncode(payload), secret ) Header Payload Signature eyJhbGciOiJIUzI1NiIsInR5cCI6I kpXVCJ9.eyJzdWIiOiIxMjM0NT Y3ODkwIiwibmFtZSI6IkpvaG4 gRG9lIiwiZXhwIjoxNTE2MjM5 MDIyfQ.E9bQ6QAil4HpH825Q C5PtjNGEDQTtMpcj0SO2W8v mag © 2023 IBM Corporation IBM MQ | 30 Years of Innovation
  • 5. IBM MQ | 30 Years of Innovation https://jwt.io/ © 2023 IBM Corporation
  • 6. Full spec IBM MQ | 30 Years of Innovation © 2023 IBM Corporation
  • 7. IBM Confidential Auth Server IBM MQ | 30 Years of Innovation © 2023 IBM Corporation Benefits
  • 8. IBM Confidential Auth Server IBM MQ | 30 Years of Innovation Centralized Authentication © 2023 IBM Corporation
  • 9. IBM Confidential Auth Server Credentials only go to authentication server Token © 2023 IBM Corporation
  • 10. IBM Confidential Auth Server IBM MQ | 30 Years of Innovation Authenticate how you choose Token © 2023 IBM Corporation
  • 11. IBM Confidential Auth Server Tokens contain information Token © 2023 IBM Corporation • User • Groups • Authorizations • Expiry • Who issed • etc IBM MQ | 30 Years of Innovation
  • 12. IBM Automation / June, 2023 / © 2023 IBM Corporation 12 How does JWT work in MQ? IBM MQ | 30 Years of Innovation
  • 13. IBM MQ 9.3.4 – Token-based authentication From IBM MQ 9.3.4, client applications can provide tokens to authenticate with a queue manager. The queue manager must be configured to accept authentication tokens. • Token-based authentication is supported by queue managers that run on AIX®, Linux®, and OpenShift® Container Platforms. • IBM MQ MQI clients written in C present tokens on connection and can be authenticated. • The client application can run on any platform. • Both IBM MQ MQI clients and Java clients can remain unchanged and use security exits to send authentication tokens to the queue manager. © 2023 IBM Corporation IBM MQ | 30 Years of Innovation
  • 14. Auth Server MQ Config Keystore Queue Manager IBM MQ | 30 Years of Innovation © 2023 IBM Corporation
  • 15. Must be 12 characters or less Identity adoption IBM MQ | 30 Years of Innovation © 2023 IBM Corporation
  • 16. MQCNO cno = {MQCNO_DEFAULT}; MQCSP csp = {MQCSP_DEFAULT}; Char * Token; ... cno.SecurityParmsPtr = &csp; cno.Version = MQCNO_VERSION_5; Token = myOAUthLogin(User,Pass); csp.Version = MQCSP_VERSION_3; csp.AuthenticationType = MQCSP_AUTH_ID_TOKEN; csp.TokenPtr = Token; csp.TokenLength = (MQLONG)strlen(Token); MQCONNX(QMName, &cno, &Hcon, &CompCode, &Creason); Application Changes • C Clients • Network bound © 2023 IBM Corporation
  • 17. Security exits Auth Server C client App SCYEXIT SCYEXIT IBM MQ | 30 Years of Innovation © 2023 IBM Corporation
  • 18. Security exits Auth Server Java/JMS client App SCYEXIT IBM MQ | 30 Years of Innovation © 2023 IBM Corporation
  • 19. Demo?
  • 20. © 2022 IBM Corporation
  • 21. Notices and disclaimers © 2023 International Business Machines Corporation. All rights reserved. This document is distributed “as is” without any warranty, either express or implied. In no event shall IBM be liable for any damage arising from the use of this information, including but not limited to, loss of data, business interruption, loss of profit or loss of opportunity. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. Not all offerings are available in every country in which IBM operates. Any statements regarding IBM’s future direction, intent or product plans are subject to change or withdrawal without notice. IBM, the IBM logo, and ibm.com are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at: www.ibm.com/legal/copytrade.shtml. Certain comments made in this presentation may be characterized as forward looking under the Private Securities Litigation Reform Act of 1995. Forward-looking statements are based on the company’s current assumptions regarding future business and financial performance. Those statements by their nature address matters that are uncertain to different degrees and involve a number of factors that could cause actual results to differ materially. Additional information concerning these factors is contained in the Company’s filings with the SEC. Copies are available from the SEC, from the IBM website, or from IBM Investor Relations. Any forward-looking statement made during this presentation speaks only as of the date on which it is made. The company assumes no obligation to update or revise any forward-looking statements except as required by law; these charts and the associated remarks and comments are integrally related and are intended to be presented and understood together. 21 © 2023 IBM Corporation