GCSS-AF SOA and Web Services Infrastructure & Support
|
|
|
- Valentine Bailey
- 10 years ago
- Views:
Transcription
1 GCSS-AF SOA and Web Services Infrastructure & Support May 2009 Mike Acton Lockheed Martin 0
2 Agenda Building the GCSS-AF SOA Infrastructure The SOA Journey GCSS-AF SOA Infrastructure Data Power SOA Appliance ESB: Web Services to/from Flat Files Web Services Security Consuming Web Services 1
3 The Web Services Effect 2
4 Building the GCSS-AF SOA Infrastructure GCSS-AF provides a Modern Enterprise SOA and Information Integration Platform that facilitates data exchange among modern and legacy systems 3
5 Building the GCSS-AF SOA Infrastructure Drivers: GCSS-AF only hosts infrastructure services that applications need and actively use Business Case-Driven Implement GCSS-AF RMB Approved Requirements (including approved community Change Requests) Strategic Planning Process SOA Maturity Models Business Maturity Models FIND PUBLISH INTERACT 4
6 From Silos to Reusable Services 5
7 The SOA Journey 6
8 SOA Roadmap 7
9 GCSS-AF Conceptual SOA Service Discovery includes the Repository and Registry Automated workflow-based Governance is the KEY to success! 8
10 GCSS-AF SOA and Web Services Infrastructure Governance Design-Time Governance EIT-GP (GCSS-AF EIT Governance Portal, aka: GCSS-AF.com) Run-Time Governance N/A Ex: AmberPoint Service Discovery Web Service Repository Web Services Registry Service Security Web Service Proxy Access Management Identity Management Federation Reduced Sign On (RSO) Integration Service Mediation Hardware Mediation Software Mediation Machine to Machine (M2M) Messaging Enterprise Service Bus (ESB) ESB Flat File Processing Business Process (BPEL) Orchestration Business Process (BPEL) Engine EIT-GP (GCSS-AF EIT Governance Portal, aka: GCSS-AF.com) HP Systinet DataPower XI50 SOA Appliance Tivoli Access Manager Tivoli Identity Manager Tivoli Federated Identity Manager Tivoli Access Manager DataPower XI50 SOA Appliance ESB Mediation, Informatica MQSeries, Message Broker ESB and DataPower XI50 SOA Appliance IBM Process Server, Oracle BPM Server Enterprise Service Management (ESM) URI Monitoring HP Site Scope DISA Provided Web Services Monitoring N/A Ex: AmberPoint Web Services Runtime Policy Enforcement N/A Ex: AmberPoint Web Application Servers Java Java.NET Extract, Transform, Load (ETL) Informatica Suite IBM Oracle Microsoft NOTE: Complete GCSS-AF Product and Version Listing: 9
11 Data Power XI50 SOA Integration and Security Appliance OVERVIEW XML-to-'Any' Conversion at Wirespeed Integrated message-level security X150 is a network device capable of transforming between disparate message formats, including binary, legacy, and XML, and providing message routing and security. XI50 can be used for costeffective XML enablement of mainframes, wirespeed enterprise message buses, and enterprise application integration Problems Solved: WS Application Integration Integrates SOA and Web services deployments Transforms between disparate message formats (binary, legacy, XML, etc.) Bridges wireline transport-level protocols (HTTP, MQ, FTP, JMS, TIBCO EMS, etc.) Security Features: XML/SOAP Firewall - Filter on any content, metadata or network variables Web Application Firewall - Cookie rewriting, HTTP header injection /suppression Data Validation - Approve incoming/outgoing XML and SOAP at wirespeed XML Threat Protection - Mitigate risk from new and emerging application-layer threats XML Security - Encrypt and sign message/fields, provide message confidentiality and integrity Web Services Access Control - SAML, WS-Security, LDAP, Kerberos, LTPA, RADIUS, digital certificates, usernames /passwords, etc. MultiStep and XML/SOAP Routing - Sophisticated multi-stage pipeline Web Services Management - Secure Web services proxy, Service-Level Management (SLM) Transport Layer Flexibility - SSL acceleration; secure insecure zone bridging Service Virtualization - Reverse proxy masks endpoints and back-end resources Configuration and Administration - Ease of use, integration for management Extensibility - Extending the base functionality using standards-based approaches 10
12 Web Services Security - Enterprise Proxy Approach Supports internal, external and federated service access. Service Messaging and Security Extensions The entire process takes place in between the requesting client and hosted service. Clients remain unaware of the entire process, while the intended Web services do not have to be concerned with performing security functions. Advantages: Mitigates and protects against the major categories and many types of security threats to Web services and messaging. Security functions can be performed directly by the proxy rather than being implemented in the actual applications and services. Security functions are hidden from clients, who remain unaware of the process. Bi-directional security protects both the client and service provider. Web services are concealed by the proxy, which only establishes a connection for authorized clients. Web service providers are not affected by the function of the proxy, as it is an independent entity. Proxies can be easily added and removed to and from an architecture depending on system and service needs. The proxy promotes loose coupling and the separation of distinct services. 11
13 Modern/Legacy Mediation: Web Services to/from Flat Files Change Request #1963 Web Service Sent to Flat File Recipient (w/data mediation) Flat File Sent to Web Service Recipient (w/data mediation) Production Configuration: ESB DataPower XI50s Authentication and Access Web Service Management GUI Tool Web App Servers (Java and.net) ESB 12
14 Web Services Security Proxy Sequence of Events Security Controls Business Logic When a SOAP message is sent from a client to a Web service application protected by the GCSS-AF Web service proxy, the following process occurs each time: 1) The Web service client prepares the SOAP request, populating the SOAP header with a X.509 binary security token. 2) Upon receipt of the message, the Web service proxy examines the X.509 binary security token signature for authenticity. If the signature is invalid, indicating some form of tampering occurred, a SOAP fault is returned to the Web service client. If the signature is valid, the next step in the process occurs. 3) A valid X.509 certificate associated with the X.509 binary security token is used to authenticate a service user through an access manager, which is an integrated COTS solution used for authorization and identity management. If the service user cannot be identified, a SOAP fault is returned to the Web service client. 4) If the service user is identified, the access manager begins authorizing the client based on the Web Service method. If the service user is not authorized to access the Web service method, a SOAP fault is returned to the Web service client. 5) If the service user IS AUTHENTICATED AND AUTHORIZED to call the Web service method, the Web service proxy calls the protected Web service method, and the data is returned to the Web service client. 13
15 REST Service Support REST services are more free-form than Web Services and don t provide a WSDL which serves as the basis for the web service proxy configuration We lose the ws-security extensions and would therefore require mutual authn on all REST connections XML validation and acceleration provided by DP would also be impacted Bottom line is that we can support REST via DataPower Some design work is needed for those services since the wsdl and soap elements shown on the previous slides are not supported by REST services It may make sense to secure REST services via WebSEAL security junctions 14
16 Consuming Web Services (5 Steps) Find It! View It! Secure It! Connect It! Governance Process Consume It! EIT-Governance Portal Services Repository ( Workplans (Governance/Permissions) Descriptions, Guides WSDL XML Schemas X.509 Certificate (Authentication) Use AF Process for obtaining certificate TAM Roles (Authorization) Java and.net Web Services SOAP XML Payload XML Schemas Transformations Contact Outreach Support 15
17 Developer s Tips Contact Outreach to discuss your data needs Outreach has Web Service and DataPower Expertise Complete a Work Plan on EIT-GP Open Change Requests and Follow Up w/gcss-af if you need additional capabilities Develop and Test your Web Service in the CIE Full installation of GCSS-AF in CIE for development/testing Including ESB and DataPower XI50 16
18 Resources An Introduction to IBM Rational Application Developer ISBN-13: IBM WebSphere DataPower SOA Appliance Handbook ISBN-13: IBM SOA and Web Services Developer s Website: works/webservices IBM SOA Sandbox works/downloads/soasandbox/? S_TACT=105AGX04&S_CMP=HP 17
19 BACKUP 18
20 DataPower Web Service Proxy Test Example public class GcssAfWsProxyTest { } private static EngineConfiguation createclientconfig() { SimpleProvider clientconfig = new SimpleProvider(); Handler securityhandler = (Handler)new WSDoAllSender(); securityhandler.setoption(wshandlerconstants.action, WSHandlerConstants.SIGNATURE); securityhandler.setoption(wshandlerconstants.user, gcss-af-ws-proxy-test-user"); securityhandler.setoption(wshandlerconstants.password_type, WSConstants.PW_TEXT); securityhandler.setoption(wshandlerconstants.sib_prop_file, client_crypto.properties"); securityhandler.setoption(wshandlerconstants.sig_key_id, "DirectReference"); securityhandler.setoption(wshandlerconstants.pw_callback_class, "smartdemo.pwcallback"); SimpleChain reqhandler = new SimpleChain(); SimpleChain reshandler = new SimpleChain(); reqhandler.addhandler(securityhandler); resphandler.addhandler(securityhandler); Handler pivot = (Handler)new HTTPSender(); Handler transport = new SimpleTargetedChain(reqHandler, pivot, resphandler); clientconfig.deploytransport(httptransport.default_transport_name,transport); return clientcofig; } public static void main(string[] args) { try { System.setProperty( "javax.net.ssl.truststore", "jssecacerts"); System.setProperty( "javax.net.ssl.truststorepassword", "changeit"); java.net.url url = new java.net.url ( "url to web service"); SmartWebServicesLocator locator = new SmartWebServicesLocator(); EngineConfiguration clientconfig = createclientconfig(); locator.setengineconfiguration(clientconfig); locator.setengine(new AxisClient(clientConfig)); SmartWebServiceSoap client = locator.getsmartwebservicessoap(url); String response = client.getacquisitiongrouplist(498); System.out.println(response); } catch ( Exception e ) { e.printstacktrace(); } } 19
21 SOAP Request, WS-Security 1.0 Binary Security Token with Client Signature <soapenv:envelope xmlns:mil=" xmlns:soapenv=" <soapenv:header> <wsse:security soapenv:mustunderstand="1" xmlns:wsse=" <wsse:binarysecuritytoken EncodingType=" ValueType=" wsu:id="certid " xmlns:wsu=" </wsse:binarysecuritytoken> <ds:signature Id="Signature " xmlns:ds=" <ds:signedinfo> <ds:canonicalizationmethod Algorithm=" <ds:signaturemethod Algorithm=" <ds:reference URI="#id "> <ds:transforms> <ds:transform Algorithm=" Signature Reference </ds:transforms> <ds:digestmethod Algorithm=" <ds:digestvalue>bvvbbtuhupfbfofnfqjehjn2wfy=</ds:digestvalue> Signed Body </ds:reference> </ds:signedinfo> WS-Security Binary Security Token <ds:signaturevalue>pclxgjqfscp/xjsc43uj4nxrzp32g/eqzcpwehy0hd1bt4+p7oecd49ccds1tmivq8cqxbbm9tbxpw6ze7tpuiaqrfa3huwlzaqi7bmrrtzdjn/lq 3Cp7m/3Ly1VmREXpryROw25ms12JQwBWcErpaqxEovudHe7ffy9jYBwWoo=</ds:SignatureValue> <ds:keyinfo Id="KeyId "> <wsse:securitytokenreference wsu:id="strid " xmlns:wsu=" 1.0.xsd"> <wsse:reference URI="#CertId " ValueType=" </wsse:securitytokenreference> </ds:keyinfo> </ds:signature> <wsu:timestamp wsu:id="timestamp " xmlns:wsu=" <wsu:created> t19:10:27.741z</wsu:created> <wsu:expires> t19:15:27.741z</wsu:expires> </wsu:timestamp> </wsse:security> </soapenv:header> <soapenv:body wsu:id="id " xmlns:wsu=" <mil:getacquisitiongrouplist> <mil:acquisitiongrouplistrequestdata> <mil:rootacquisitiongroupid>498</mil:rootacquisitiongroupid> </mil:acquisitiongrouplistrequestdata> </mil:getacquisitiongrouplist> </soapenv:body> </soapenv:envelope> 20
22 SOAP Response, WS-Security 1.0 Binary Security Token with ServerSignature <soap:envelope xmlns:soap=" xmlns:xsi=" xmlns:xsd=" <soapenv:header xmlns:soapenv=" <wsse:security soapenv:mustunderstand="1" xmlns:wsse=" <wsu:timestamp wsu:id="timestamp-a4fc714d-bb0f-4dbb-bda7-a0bce11c7762" xmlns:wsu=" <wsu:created> t19:12:12z</wsu:created> <wsu:expires> t19:17:12z</wsu:expires> </wsu:timestamp> <wsse:binarysecuritytoken wsu:id="securitytoken-52d5e357-c71f-4e26-9d58-661afca1a3ae" EncodingType=" ValueType=" xmlns:wsu=" 1.0.xsd"> </wsse:binarysecuritytoken> <Signature xmlns=" <SignedInfo> <CanonicalizationMethod Algorithm=" <SignatureMethod Algorithm=" <Reference URI="#Body-adec4fad-7f be7e-5231b8c44c94"> <Transforms> <Transform Algorithm=" </Transforms> <DigestMethod Algorithm=" <DigestValue>yOkGiRm2xIx97APjTl8lC38luLE=</DigestValue> </Reference> </SignedInfo> WS-Security Binary Security Token Signature Reference Signed Body <SignatureValue>hW00aGrz3p65s5Ouno0obtMc+mCNcbetwuIPGv2VWDCY09jpHgcDb6Mr4QxQbPx4ArNFSI669TIOl8z/jQDr2xqv/3TrDH16jVWq5qOzqoulqs8wzd mnv5j3hrsaax2elnn9hgb88qr7nevfzkcj/xbprmwq3o2sr/ohqgutr5q=</signaturevalue> <KeyInfo> <wsse:securitytokenreference xmlns=""> <wsse:reference URI="#SecurityToken-52d5e357-c71f-4e26-9d58-661afca1a3ae" ValueType=" wss-x509-token-profile-1.0#x509v3"/> </wsse:securitytokenreference> </KeyInfo> </Signature> </wsse:security> </soapenv:header> <soap:body wsu:id="body-adec4fad-7f be7e-5231b8c44c94" xmlns:wsu=" <GetAcquisitionGroupListResponse xmlns=" <AcquisitionGroupListResponseData> </AcquisitionGroupListResponseData> </GetAcquisitionGroupListResponse> </soap:body> </soap:envelope> 21
23 Echo Web Service Example package com.ibm.was.wssample.sei.echo; import java.net.malformedurlexception; import java.net.url; import javax.xml.namespace.qname; import javax.xml.ws.service; import javax.xml.ws.webendpoint; import javax.xml.ws.webserviceclient; /** * This class was generated by the JAXWS SI. * JAX-WS RI 2.0_01-b15-fcs * Generated source version: 2.0 = "EchoService", targetnamespace = " wsdllocation = "WEB-INF/wsdl/Echo.wsdl") public class EchoService extends Service { private final static URL ECHOSERVICE_WSDL_LOCATION; static { URL url = null; try { url = new URL("file:/WEB-INF/wsdl/Echo.wsdl"); } catch (MalformedURLException e) { e.printstacktrace(); } ECHOSERVICE_WSDL_LOCATION = url; } public EchoService(URL wsdllocation, QName servicename) { super(wsdllocation, servicename); } public EchoService() { super(echoservice_wsdl_location, new QName(" "EchoService")); } /** * returns EchoServicePortType = "EchoServicePort") public EchoServicePortTypeClient getechoserviceport() { return (EchoServicePortTypeClient)super.getPort(new QName(" "EchoServicePort"), EchoServicePortTypeClient.class); } } 22
24 ESB Architecture Process Engine NIPR SIPR Process Engine Legacy System Domain App Domain App Domain App Domain App Legacy System FTP Adapter ESB Cross-Domain Service ESB Legacy System ERP Module AFKS NIPR Portal SIPR Portal 23
25 DataPower XI50 Reference Architecture 24
Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact
Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Robert C. Broeckelmann Jr., Enterprise Middleware Architect Ryan Triplett, Middleware Security Architect Requirements
Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy [email protected] CTO, Forum Systems
Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy [email protected] CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary
Encryption, Signing and Compression in Financial Web Services
Danske Bank Encryption, Signing and Compression in Financial Web Services Details of how to call the Danske Bank financial web service Version 2.4.7 Encryption, Signing and Compression in Financial Web
Technik und Informatik. SOAP Security. Prof. Dr. Eric Dubuis Berner Fachhochschule Biel. Version April 11, 2012
SOAP Security Prof. Dr. Eric Dubuis Berner Fachhochschule Biel Version April 11, 2012 Overview Motivation Transport security versus SOAP Security WS-Security stack overview Structure of secured SOAP messages
Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB
IBM Software for WebSphere Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB Presenter: Kim Clark Email: [email protected] Date: 27/02/2007 SOA Design with WebSphere
AquaLogic Service Bus
AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
DataPower SOA Appliances Simplify, Secure, and Accelerate SOA
DataPower SOA Appliances Simplify, Secure, and Accelerate SOA Nitin Thukral, CISSP Canadian National Specialist 2007 IBM Corporation Agenda 1. New Model Required for SOA and Web Services 2. DataPower SOA
Integrated Systems & Solutions. Some Performance and Security Findings Relative to a SOA Ground Implementation. March 28, 2007. John Hohwald.
Some Performance and Security Findings Relative to a SOA Ground Implementation March 28, 2007 John Hohwald Slide 1 Ground SOA Implementation Issues SOA Benchmarking Benchmarked a variety of vendors IBM
Service Oriented Architecture Case: IBM SOA Reference Architecture
Service Oriented Architecture Case: IBM SOA Reference Architecture Group 6: 0309441 Mikko Seppälä 0275669 Puranen Sami Table of Contents 1 International Business Machines Corporation... 3 2 IBM and Services
Securely Managing and Exposing Web Services & Applications
Securely Managing and Exposing Web Services & Applications Philip M Walston VP Product Management Layer 7 Technologies Layer 7 SecureSpan Products Suite of security and networking products to address the
Closer Look at Enterprise Service Bus. Deb L. Ayers Sr. Principle Product Manager Oracle Service Bus SOA Fusion Middleware Division
Closer Look at Enterprise Bus Deb L. Ayers Sr. Principle Product Manager Oracle Bus SOA Fusion Middleware Division The Role of the Foundation Addressing the Challenges Middleware Foundation Efficiency
000-284. Easy CramBible Lab DEMO ONLY VERSION 000-284. Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0
Easy CramBible Lab 000-284 Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0 ** Single-user License ** This copy can be only used by yourself for educational purposes Web: http://www.crambible.com/
WebSphere Integration Solutions. IBM Day Minsk 2014. Anton Litvinov WebSphere Connectivity Professional Central Eastern Europe
WebSphere Integration Solutions IBM Day Minsk 2014 Ann Litvinov WebSphere Connectivity Professional Central Eastern Europe 1 Agenda 1 Understand vision for ESB capabilities 2 Understand DataPower Basics
Secure Services withapache CXF
Karlsruher Entwicklertag 2014 Secure Services withapache CXF Andrei Shakirin, Talend [email protected] ashakirin.blogspot.com/ Agenda Introduction in Apache CXF Security Requirements Apply security
KC Data Integration Web Service Developer Guide
KC Data Integration Web Service Developer Guide Kewill Copyright Notice Copyright 2016 by Kewill Inc. All rights reserved. This document is the property of Kewill and the information contained herein is
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?
Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus
Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 Unit objectives
000-609. IBM WebSphere Data Power SOA Applicances V3.8.1 Solution IMP. Version: Demo. Page <<1/10>>
000-609 IBM WebSphere Data Power SOA Applicances V3.8.1 Solution IMP Version: Demo Page 1. Which of the following is an advantage of using WS-Security instead of SSL? A. Provides assured message
Securing Web Services From Encryption to a Web Service Security Infrastructure
Securing Web Services From Encryption to a Web Service Security Infrastructure Kerberos WS-Security X.509 TLS Gateway OWSM WS-Policy Peter Lorenzen WS-Addressing Agent SAML Policy Manager Technology Manager
Creating a Strong Security Infrastructure for Exposing JBoss Services
Creating a Strong Security Infrastructure for Exposing JBoss Services JBoss Enterprise SOA Platform Service Clients Service Gateway Enterprise Services Blake Dournaee, Product Management, Intel SOA Products
CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282
Web Service Security Anthony Papageorgiou IBM Development March 13, 2012 Session: 10282 Agenda Web Service Support Overview Security Basics and Terminology Pipeline Security Overview Identity Encryption
AquaLogic ESB Design and Integration (3 Days)
www.peaksolutions.com AquaLogic ESB Design and Integration (3 Days) Audience Course Abstract Designed for developers, project leaders, IT architects and other technical individuals that need to understand
IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities.
Application integration solutions To support your IT objectives IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities. Market conditions and business
Unifying IT Vision Through Enterprise Architecture
Unifying IT Vision Through Enterprise Architecture A model for Strategic Alignment Northeast Ohio Information Technology & Enterprise Architects (NEO-ITEA) Presentation To: Integrate 2010: Uniting the
<Insert Picture Here> Oracle Web Services Manager (WSM)
Oracle Web Services Manager (WSM) Marc Chanliau Director, Product Management Outline Introduction Product Overview Typical Use-Case Scenarios Roadmap Q & A Introduction
Service Virtualization: Managing Change in a Service-Oriented Architecture
Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual
SCA-based Enterprise Service Bus WebSphere ESB
IBM Software Group SCA-based Enterprise Service Bus WebSphere ESB Soudabeh Javadi, WebSphere Software IBM Canada Ltd [email protected] 2007 IBM Corporation Agenda IBM Software Group WebSphere software
Web Services Advanced Topics
Web Services Advanced Topics Where things are now and where they are going Version 9 Web Services Advanced Topics WSAdvanced-2 Enterprise Web Services Industry trends and organizations Security and Reliability
02267: Software Development of Web Services
02267: Software Development of Web Services Week 11 Hubert Baumeister [email protected] Department of Applied Mathematics and Computer Science Technical University of Denmark Fall 2015 1 Contents WS-Policy Web
IBM WebSphere DataPower Integration Appliance XI52
IBM WebSphere DataPower Integration Appliance XI52 Save time, reduce cost, and improve security with this purpose-built appliance for application integration Highlights Save time, reduce cost and improve
Middleware and the Internet
Middleware and the Internet Middleware today Designed for special purposes (e.g. DCOM) or with overloaded specification (e.g. CORBA) Specifying own protocols integration in real world network? Non-performant
Introduction to Service Oriented Architecture (SOA)
Introduction to Service Oriented Architecture (SOA) Hari Rajagopal Galileo International Hari Rajagopal Introduction to Service Oriented Architecture (SOA) Page 1 Agenda Definitions Background SOA principles
Federal Enterprise Architecture and Service-Oriented Architecture
Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010
Tomáš Müller IT Architekt 21/04/2010 ČVUT FEL: SOA & Enterprise Service Bus. 2010 IBM Corporation
Tomáš Müller IT Architekt 21/04/2010 ČVUT FEL: SOA & Enterprise Service Bus Agenda BPM Follow-up SOA and ESB Introduction Key SOA Terms SOA Traps ESB Core functions Products and Standards Mediation Modules
Enterprise Reference Architecture
Prepared by Enterprise Planning and Architecture Strategies Team Page 1 of 19 Control Page: Revision History: Version No Revised Date Author Comments 03/18/2011 Anitha Ramakrishnan Initial Version Page
1 What Are Web Services?
Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1.6) E14294-06 November 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include:
Managing SOA Security and Operations with SecureSpan
Managing SOA Security and Operations with SecureSpan Francois Lascelles Technical Director, Layer 7 Technologies 1 Customers Revenue About Layer 7 Layer 7 is the leading vendor of security and governance
XML Signatures in an Enterprise Service Bus Environment
XML Signatures in an Enterprise Bus Environment Eckehard Hermann Research & Development XML Integration Uhlandstraße 12 64297 Darmstadt, Germany [email protected] Dieter Kessler Research
Security in integration and Enterprise Service Bus(ESB) Anton Panhelainen Principal Technology Consultant Tieto Oy anton.panhelainen@tieto.
Security in integration and Enterprise Service Bus(ESB) Anton Panhelainen Principal Technology Consultant Tieto Oy [email protected] 1 About Anton Panhelainen 12 years of experience building
WELCOME TO Open Source Enterprise Architecture
WELCOME TO Open Source Enterprise Architecture WELCOME TO An overview of Open Source Enterprise Architecture In the integration domain Who we are Fredrik Hilmersson Petter Nordlander Why Open Source Integration
CA SOA Security Manager
CA SOA Security Manager Implementation Guide r12.1 Second Edition This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational
Achieving business agility and cost optimization by reducing IT complexity. The value of adding ESB enrichment to your existing messaging solution
Smart SOA application integration with WebSphere software To support your business objectives Achieving business agility and cost optimization by reducing IT complexity. The value of adding ESB enrichment
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
1 What Are Web Services?
Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1) E14294-04 January 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include: What
SOA Software: Troubleshooting Guide for Policy Manager for DataPower
SOA Software: Troubleshooting Guide for Policy Manager for DataPower Troubleshooting Guide for Policy Manager for DataPower 1 SOA Software Policy Manager Troubleshooting Guide for Policy Manager for DataPower
Service Mediation. The Role of an Enterprise Service Bus in an SOA
Service Mediation The Role of an Enterprise Service Bus in an SOA 2 TABLE OF CONTENTS 1 The Road to Web Services and ESBs...4 2 Enterprise-Class Requirements for an ESB...5 3 Additional Evaluation Criteria...7
JBOSS ENTERPRISE SOA PLATFORM AND JBOSS ENTERPRISE DATA SERVICES PLATFORM VALUE PROPOSITION AND DIFFERENTIATION
JBOSS ENTERPRISE SOA PLATFORM AND JBOSS ENTERPRISE DATA SERVICES PLATFORM VALUE PROPOSITION AND DIFFERENTIATION Service-oriented architecture (SOA) gives enterprises the ability to identify and respond
Oracle Business Activity Monitoring 11g New Features
Oracle Business Activity Monitoring 11g New Features Gert Schüßler Principal Sales Consultant Oracle Deutschland GmbH Agenda Overview Architecture Enterprise Integration Framework
Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems [email protected]
Mobile Identity and Edge Security Forum Sentry Security Gateway Jason Macy CTO, Forum Systems [email protected] Evolution Evolution of Enterprise Identities Cloud Computing Iaas Infrastructure as a Service
Configuring SAML2 for Single Sign-On to Smartsheet (Enterprise Only)
Configuring SAML2 for Single Sign-On to Smartsheet (Enterprise Only) This document is intended for technical professionals who are familiar with SAML and have access to the Identity Provider that will
IBM DataPower SOA Appliances & MQ Interoperability
Appliances & MQ Interoperability Joel Gauci-Certified IT Specialist, & Connectivity Appliances [email protected] MQ Guide Share France 2006 Corporation Agenda Appliances & MQ Interoperability Part 1: Appliances
File Transfer Service (Batch SOAP) User Guide. A Guide to Submitting batches through emedny FTS
File Transfer Service (Batch SOAP) User Guide A Guide to Submitting batches through emedny FTS June 1, 2013 TABLE OF CONTENTS TABLE OF CONTENTS 1 Introduction... 4 2 Requirements... 5 2.1 Exchange mailboxes...
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)
API Management: Powered by SOA Software Dedicated Cloud
Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting
Oracle Service Bus Examples and Tutorials
March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
Increasing IT flexibility with IBM WebSphere ESB software.
ESB solutions White paper Increasing IT flexibility with IBM WebSphere ESB software. By Beth Hutchison, Katie Johnson and Marc-Thomas Schmidt, IBM Software Group December 2005 Page 2 Contents 2 Introduction
SOA Planning Guide. 2015 The Value Enablement Group, LLC. All rights reserved.
SOA Planning Guide 1 Agenda q SOA Introduction q SOA Benefits q SOA Principles q SOA Framework q Governance q Measurement q Tools q Strategic (long term) View 2 Introduction to SOA q Service-oriented architecture
An Oracle White Paper November 2009. Oracle Primavera P6 EPPM Integrations with Web Services and Events
An Oracle White Paper November 2009 Oracle Primavera P6 EPPM Integrations with Web Services and Events 1 INTRODUCTION Primavera Web Services is an integration technology that extends P6 functionality and
SOA Fundamentals For Java Developers. Alexander Ulanov, System Architect Odessa, 30 September 2008
SOA Fundamentals For Java Developers Alexander Ulanov, System Architect Odessa, 30 September 2008 What is SOA? Software Architecture style aimed on Reuse Growth Interoperability Maturing technology framework
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I Systems Integration
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I s Integration Dr. Timothy D. Kehoe, Irene Chang, Dave Czulada, Howard Kong, Dr. Dino Konstantopoulos
SAML Profile for SSO in Danish Public Sector V2.0 Assertion Examples,
> SAML Profile for SSO in Danish Public Sector V2.0 Assertion Examples, Version 1.1 IT- og Telestyrelsen, Center for Serviceorienteret Infrastruktur August 2007 1 Introduction This non-normative document
Increasing IT flexibility with IBM WebSphere ESB software.
ESB solutions White paper Increasing IT flexibility with IBM WebSphere ESB software. By Beth Hutchison, Marc-Thomas Schmidt and Chris Vavra, IBM Software Group November 2006 Page 2 Contents 2 Introduction
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
Federated Identity and Trust Management
Redpaper Axel Buecker Paul Ashley Neil Readshaw Federated Identity and Trust Management Introduction The cost of managing the life cycle of user identities is very high. Most organizations have to manage
DocuSign Information Guide. Single Sign On Functionality. Overview. Table of Contents
DocuSign Information Guide Single Sign On Functionality Overview The DocuSign Single Sign On functionality allows your system administrators to maintain user information in one location and your users
Microsoft Active Directory Oracle Enterprise Gateway Integration Guide
An Oracle White Paper May 2011 Microsoft Active Directory Oracle Enterprise Gateway Integration Guide 1/33 Disclaimer The following is intended to outline our general product direction. It is intended
Avoiding Web Services Chaos with WebSphere Service Registry and Repository
IBM Software Group Avoiding Web s Chaos with WebSphere Registry and Repository David Buchanan David Ben Buchanan J Briden Consulting IT Specialist Consulting IT IT Specialist WebSphere Software WebSphere
Oracle SOA Suite: The Evaluation from 10g to 11g
KATTA Durga Reddy TATA Consultancy Services. Oracle SOA Suite: The Evaluation from 10g to 11g Introduction Oracle SOA Suite is an essential middleware layer of Oracle Fusion Middleware. It provides a complete
A Quick Introduction to SOA
Software Engineering Competence Center TUTORIAL A Quick Introduction to SOA Mahmoud Mohamed AbdAllah Senior R&D Engineer-SECC [email protected] Waseim Hashem Mahjoub Senior R&D Engineer-SECC Copyright
Java Security Web Services Security (Overview) Lecture 9
Java Security Web Services Security (Overview) Lecture 9 Java 2 Cryptography Java provides API + SPI for crypto functions Java Cryptography Architecture Security related core classes Access control and
Discovering the value of IBM WebSphere DataPower SOA Appliances
Group An IBM Proof of Technology Discovering the value of IBM WebSphere DataPower SOA Appliances Firmware version 3.8 Lab Exercises 2010 IBM Corporation PoT.WebSphere.08.4.060.10 Author: Gerry Kaplan,
IBM WebSphere ESB V6.0.1 Technical Product Overview
IBM WebSphere ESB V6.0.1 Technical Product Overview SOA on your terms and our expertise 2005 IBM Corporation The SOA Lifecycle.. For Flexible Business & IT Assemble Assemble existing and new assets to
IBM SOA Foundation products overview
IBM SOA Foundation products overview Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 4.0.3 Unit objectives After completing this unit, you
Web Services Security: SAML Token Profile 1.1
1 2 3 4 5 6 7 8 9 10 11 12 13 Web Services Security: SAML Token Profile 1.1 OASIS Standard, 1 February 2006 Document Identifier: wss-v1.1-spec-os-samltokenprofile OASIS Identifier: {WSS: SOAP Message Security
Methods and tools for data and software integration Enterprise Service Bus
Methods and tools for data and software integration Enterprise Service Bus Roman Hauptvogl Cleverlance Enterprise Solutions a.s Czech Republic [email protected] Abstract Enterprise Service Bus (ESB)
Service-Oriented Architecture and its Implications for Software Life Cycle Activities
Service-Oriented Architecture and its Implications for Software Life Cycle Activities Grace A. Lewis Software Engineering Institute Integration of Software-Intensive Systems (ISIS) Initiative Agenda SOA:
Federated Service Oriented Architecture for Effects-Based Operations
Federated Service Oriented Architecture for Effects-Based Operations Intelligence and Information Systems Matt Brown (720) 88-4014 [email protected] Customer Success Is Our Mission is a trademark of
MLSListings Single Sign On Implementation Guide. Compatible with MLSListings Applications
MLSListings Single Sign On Implementation Guide Compatible with MLSListings Applications February 2010 2010 MLSListings Inc. All rights reserved. MLSListings Inc. reserves the right to change details in
Sentinet for BizTalk Server SENTINET
Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and APIs Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication
Strategic Information Security. Attacking and Defending Web Services
Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP [email protected] Introduction About Security PS Application Security Assessments
Software Requirement Specification Web Services Security
Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: [email protected] This document is subject to the following license:
Exam Name: Test284,IBM WbS.DataPower SOA
Exam Code: 000-284 Exam Name: Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0 Vendor: IBM Version: DEMO Part: A 1: A company requires the transformation of a CSV (comma-separated values) file
Placement of SOA Applicance in Enterprise Architecture for Middleware Services
International Journal of Information Science and Intelligent System, Vol. 2, No.3, 2013 Placement of SOA Applicance in Enterprise Architecture for Middleware Services Gautam K Bhat 1 1 IBM India, Chennai,
The Challenges in Real Life ESB Deployments
Frank Cohen s Presentation To International SOA Conference, Rome, Italy June 25, 2009 The Challenges in Real Life ESB Deployment ScenarioThis presentation discusses some of the key challenges that are
rpafi/jl open source Apache Axis2 Web Services 2nd Edition using Apache Axis2 Deepal Jayasinghe Create secure, reliable, and easy-to-use web services
Apache Axis2 Web Services 2nd Edition Create secure, reliable, and easy-to-use web services using Apache Axis2 Deepal Jayasinghe Afkham Azeez v.? w rpafi/jl open source I I I I community experience distilled
IBM WebSphere DataPower
WebSphere DataPower Appliance The perfect XML/Web Services security gateway for SOA Service security, service-level management, mediation & policy enforcement Thomas KW Poon Advisory IT Specialist WebSphere
OIOIDWS for Healthcare Token Profile for Authentication Tokens
OIOIDWS for Healthcare Token Profile for Authentication Tokens Common Web Service Profile for Healthcare in the Danish Public Sector, version 2.0 Content Document History...3 Introduction...4 Notation...
