I've gone through this part of the official documentation of the IBM App Connect Enterprise but I can't still figure out how an integration node communicates with the default associated IBM MQ queue manager. It is obvious that the connection is locally bound (when on the same machine) but I can't figure out the following,
- What channel does IBM App Connect Enterprise use to connect to the associated queue manager?
- Which userid is used to connect?
- Since the connection is locally bound, does the authentication not happen?
- This page states "You cannot use a secured queue manager as the local default queue manager for an integration node or an integration server", what does it mean by a secured queue manager?
- How can I verify that the given queue manager is successfully associated with the node? How can I test?
Goal: Associate a local default queue manager with an integration node without disabling channel authentication and in a secure way.
Below is the response to each of your points.
What is meant by binding mode in WebSphere MQ?
https://www.ibm.com/support/knowledgecenter/SSFKSJ_7.5.0/com.ibm.mq.dev.doc/q031720_.html
The user id to connect to MQ is the service account used to run IBM ACE which is the client application in this case.
IBM MQ can be configured to authenticate local connections as well. You can turn it on by setting CHCKLOCL to REQUIRED or REQDADM. This means that you cannot locally administer the queue manager by using runmqsc (error AMQ8135: Not authorized) unless the user specifies the -u UserId parameter on the runmqsc command line. With that set, runmqsc prompts for the user's password at the console. Similarly, a user running IBM® MQ Explorer on the local system will see error AMQ4036 when attempting to connect to the queue manager. To specify a user name and password, right-click the local queue manager object and select Connection Details > Properties... from the menu. In the Userid section, enter the user name and password to be used, then click OK. More details in the following link : http://ibm.com/support/knowledgecenter/en/SSFKSJ_9.0.0/com.ibm.mq.sec.doc/q113250_.html
Secured queue manager(QM) is where you don't allow connections to connect without the right authentication/authorization. Ideally, Queue manager created to get certain IBM ACE features should be used and limited to IBM ACE only. QM should be associated with the node.
You can run the following IBM IIB/ACE command to see the output with the queue manager name if associated :
In this case, assuming IBM ACE and QM are running on the same server, you can achieve the goal in two ways :
As a good principle, use this queue manager only for IBM ACE internal node's purposes. To protect Queue manager, don't define any svrconn channels on the queue manager. This way no remote client will be able to connect to the queue manager.
You can enable LDAP auth check(AUTHTYPE(IDPWLDAP)) on the queue manager. And then set the following parameters to CHCKLOCL(NONE) and CHCKCLNT(REQUIRED). Here all the clients would be forced to propagate a user/pass. https://www.ibm.com/support/knowledgecenter/SSFKSJ_9.2.0/com.ibm.mq.sec.doc/q113250_.html