Watson Supply Chain Ideas

Submit new product ideas for Watson Supply Chain solutions. Before you submit, please review existing ideas; if an idea close to yours already exists, it's better to add comments or vote on the existing idea. We will review your ideas and use them to help prioritize our product development. Best of all, the portal will automatically update you when the status of your idea has been changed. Order Management, Store Engagement, Watson Order Optimizer, Inventory Visibility, CPQ and Call Center are now part of Watson Supply Chain

Connect with IBM experts and your peers on the Supply Chain Collaboration Community and the Order Management Interest Group

Submit ideas for other Watson Customer Engagement Products:

Watson Marketing
Watson Campaign Automation
Watson Commerce

Secure Connection between B2B Integrator Perimeter Server (in DMZ) and B2B Integrator (in Secure Network)

There is a requirement from customer to have Secure Connection between B2B Integrator Perimeter Server (in DMZ) and B2B Integrator (in Secure Network).

  • Avatar32.5fb70cce7410889e661286fd7f1897de Guest
  • Mar 14 2019
  • Uncommitted Candidate
How will this idea be used?

This is one of the key security requirement from customer.

What is your industry? Banking
What is the idea priority? Urgent
DeveloperWorks ID
RTC ID
Link to original RFE
  • Attach files
  • Avatar40.8f183f721a2c86cd98fddbbe6dc46ec9
    Guest commented
    02 Jul 17:31

    What is the definition of "Secure Connection" regarding B2B Integrator and Perimeter Server?

    Encryption? - I am not sure what that would accomplish, as the Perimeter server is merely a socket proxy, allowing B2B Integrator to communicate with the outside world, while allowing the inside firewall to block all incoming connections (connection only made from secure zone to dmz).  All encrypted data/information just passes through it between the B2B Integrator Adapters and the external client.   None of the data that transfers between B2B Integrator and the outside is stored in any way in the DMZ.  All data encryption/decryption takes place in B2B Integrator Hosts and at the Perimeter Server.   Encrypting the connection pipe between B2B Integrator and the Perimeter server will not give any gain except for with data that was not initially encrypted in the first place (which should not be done when communicating over public or wide area networks).  If you really want to double encrypt the data, then consider VPN with IPSec between B2B Integrator and DMZ.

  • Avatar40.8f183f721a2c86cd98fddbbe6dc46ec9
    Guest commented
    02 Jul 17:36

    Perimeter Server can also be configured to only allow connection to originate from Perimeter Server to B2B Integrator Server, if the communicating server is in a secure zone that B2B Integrator should not have network access to. This allows the firewall team to only allow access from the Most secure zone to the lessor.  But even in this case the data passed is still secure as much as the protocol being used is secure.