I am doing a risk review on online systems. These systems uses Tuxedo middleware to do some requests/ do services for the system. However, I am not a programmer or Tuxedo expert.
I want to know how to validate that tuxedo is actually enforcing encryption/authorization for the requested services from it (TUXEDO) is utilizing ATMI.