9. Next Steps

Congratulations! You have enabled Security Plugins in your Connext DDS applications. In these exercises, you have protected your DDS Domain and sensitive Topics with a Governance File specifying both domain-level and topic-level rules. You have also defined the permissions of your DomainParticipants, allowing them to access only the data and resources they need for their legitimate purpose. Finally, you have taken control of the security infrastructure by creating cryptographic identities for your secure DomainParticipants.

As you can see, enabling Security Plugins requires trivial or no changes to existing Connext DDS applications. It just requires modifying the QoS profiles (usually an XML file) to point to the security artifacts and plugin suite, and configuring some environment variables before running your applications. Nevertheless, keep in mind that enabling security always has an impact on the resources needed by your applications and their performance.

Now you’re ready to start implementing. You may want to consult the RTI Security Plugins User’s Manual as a reference. In particular, make sure to read these chapters: