The invention authenticates processes and inter-process messaging. In some
examples of the invention, security is performed in three layers--the
application layer, the middleware layer, and the transport layer. Some
examples of the invention include software products. One software product
comprises security software and middleware software stored on a software
storage medium. The security software directs a processor to receive a
log-in request for a process, generate a request to authenticate the
process, transfer the request to authenticate the process, receive a
security association for the process, and transfer the security
association. The middleware software directs the processor to receive the
security association from the security software, receive a message from
the process, insert the security association into the message, and
transfer the message. Another software product comprises security software
stored on a software storage medium. The security software directs a
processor to receive a request to authenticate a process, authenticate the
process, generate a security association for the process, store the
security association, transfer the security association, receive the
security association extracted from a message, and check the security
association extracted from the message with the stored security
association to authenticate the message.