Configuring BIRT iHub security
This section discusses the following topics:
*Securing data in a BIRT iHub volume
*BIRT iHub secure communications
*Using SSL
*Using a Java policy file to control access to protected resources