GCSS-AF SOA and Web Services Infrastructure & Support

Similar documents
Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Encryption, Signing and Compression in Financial Web Services

Technik und Informatik. SOAP Security. Prof. Dr. Eric Dubuis Berner Fachhochschule Biel. Version April 11, 2012

Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB

AquaLogic Service Bus

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

ARCHITECTURE FRAMEWORK PROPOSAL FOR DYNAMIC AND UBIQUITOUS SECURITY IN GLOBAL SOA

DataPower SOA Appliances Simplify, Secure, and Accelerate SOA

Integrated Systems & Solutions. Some Performance and Security Findings Relative to a SOA Ground Implementation. March 28, John Hohwald.

Service Oriented Architecture Case: IBM SOA Reference Architecture

Securely Managing and Exposing Web Services & Applications

Closer Look at Enterprise Service Bus. Deb L. Ayers Sr. Principle Product Manager Oracle Service Bus SOA Fusion Middleware Division

Easy CramBible Lab DEMO ONLY VERSION Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0

WebSphere Integration Solutions. IBM Day Minsk Anton Litvinov WebSphere Connectivity Professional Central Eastern Europe

Secure Services withapache CXF

KC Data Integration Web Service Developer Guide

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus

IBM WebSphere Data Power SOA Applicances V3.8.1 Solution IMP. Version: Demo. Page <<1/10>>

Securing Web Services From Encryption to a Web Service Security Infrastructure

Creating a Strong Security Infrastructure for Exposing JBoss Services

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282

AquaLogic ESB Design and Integration (3 Days)

Security and Reliability for Web Services

IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities.

Unifying IT Vision Through Enterprise Architecture

<Insert Picture Here> Oracle Web Services Manager (WSM)

Service Virtualization: Managing Change in a Service-Oriented Architecture

SCA-based Enterprise Service Bus WebSphere ESB

Web Services Advanced Topics

02267: Software Development of Web Services

IBM WebSphere DataPower Integration Appliance XI52

Grid Working Draft - Informational, GWD-I-XXX Network Service Interface (NSI) Working Group (WG) September 1, 2010

Middleware and the Internet

Introduction to Service Oriented Architecture (SOA)

Federal Enterprise Architecture and Service-Oriented Architecture

Tomáš Müller IT Architekt 21/04/2010 ČVUT FEL: SOA & Enterprise Service Bus IBM Corporation

Enterprise Reference Architecture

1 What Are Web Services?

Managing SOA Security and Operations with SecureSpan

XML Signatures in an Enterprise Service Bus Environment

Security in integration and Enterprise Service Bus(ESB) Anton Panhelainen Principal Technology Consultant Tieto Oy

WELCOME TO Open Source Enterprise Architecture

CA SOA Security Manager

Achieving business agility and cost optimization by reducing IT complexity. The value of adding ESB enrichment to your existing messaging solution

Single Sign-On Implementation Guide

1 What Are Web Services?

SOA Software: Troubleshooting Guide for Policy Manager for DataPower

Service Mediation. The Role of an Enterprise Service Bus in an SOA

JBOSS ENTERPRISE SOA PLATFORM AND JBOSS ENTERPRISE DATA SERVICES PLATFORM VALUE PROPOSITION AND DIFFERENTIATION

Oracle Business Activity Monitoring 11g New Features

Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems

Configuring SAML2 for Single Sign-On to Smartsheet (Enterprise Only)

IBM DataPower SOA Appliances & MQ Interoperability

File Transfer Service (Batch SOAP) User Guide. A Guide to Submitting batches through emedny FTS

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

API Management: Powered by SOA Software Dedicated Cloud

Oracle Service Bus Examples and Tutorials

Single Sign-On Implementation Guide

Increasing IT flexibility with IBM WebSphere ESB software.

SOA Planning Guide The Value Enablement Group, LLC. All rights reserved.

An Oracle White Paper November Oracle Primavera P6 EPPM Integrations with Web Services and Events

SOA Fundamentals For Java Developers. Alexander Ulanov, System Architect Odessa, 30 September 2008

Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I Systems Integration

SAML Profile for SSO in Danish Public Sector V2.0 Assertion Examples,

Increasing IT flexibility with IBM WebSphere ESB software.

An Oracle White Paper Dec Oracle Access Management Security Token Service

Federated Identity and Trust Management

DocuSign Information Guide. Single Sign On Functionality. Overview. Table of Contents

Microsoft Active Directory Oracle Enterprise Gateway Integration Guide

Avoiding Web Services Chaos with WebSphere Service Registry and Repository

Web Services Security with SOAP Security Proxies

Oracle SOA Suite: The Evaluation from 10g to 11g

A Quick Introduction to SOA

Java Security Web Services Security (Overview) Lecture 9

Discovering the value of IBM WebSphere DataPower SOA Appliances

IBM WebSphere ESB V6.0.1 Technical Product Overview

Sharing Data with Customers and Suppliers

IBM SOA Foundation products overview

Web Services Security: SAML Token Profile 1.1

Brief History of Software

Methods and tools for data and software integration Enterprise Service Bus

zenterprise The Ideal Platform For Smarter Computing Eliminating Redundant Software

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms

Service-Oriented Architecture and its Implications for Software Life Cycle Activities

Federated Service Oriented Architecture for Effects-Based Operations

MLSListings Single Sign On Implementation Guide. Compatible with MLSListings Applications

Sentinet for BizTalk Server SENTINET

Strategic Information Security. Attacking and Defending Web Services

26.Roundtable Münchner Unternehmerkreis IT Simone Frömming - Vice President Sales Oracle Deutschland GmbH

ACADEMIC RESEARCH INTEGRATION SYSTEM

Software Requirement Specification Web Services Security

Exam Name: Test284,IBM WbS.DataPower SOA

Placement of SOA Applicance in Enterprise Architecture for Middleware Services

The Challenges in Real Life ESB Deployments

rpafi/jl open source Apache Axis2 Web Services 2nd Edition using Apache Axis2 Deepal Jayasinghe Create secure, reliable, and easy-to-use web services

IBM WebSphere DataPower

OIOIDWS for Healthcare Token Profile for Authentication Tokens

Transcription:

GCSS-AF SOA and Web Services Infrastructure & Support May 2009 Mike Acton Lockheed Martin 0

Agenda Building the GCSS-AF SOA Infrastructure The SOA Journey GCSS-AF SOA Infrastructure Data Power SOA Appliance ESB: Web Services to/from Flat Files Web Services Security Consuming Web Services 1

The Web Services Effect 2

Building the GCSS-AF SOA Infrastructure GCSS-AF provides a Modern Enterprise SOA and Information Integration Platform that facilitates data exchange among modern and legacy systems 3

Building the GCSS-AF SOA Infrastructure Drivers: GCSS-AF only hosts infrastructure services that applications need and actively use Business Case-Driven Implement GCSS-AF RMB Approved Requirements (including approved community Change Requests) Strategic Planning Process SOA Maturity Models Business Maturity Models FIND PUBLISH INTERACT 4

From Silos to Reusable Services 5

The SOA Journey 6

SOA Roadmap 7

GCSS-AF Conceptual SOA Service Discovery includes the Repository and Registry Automated workflow-based Governance is the KEY to success! 8

GCSS-AF SOA and Web Services Infrastructure Governance Design-Time Governance EIT-GP (GCSS-AF EIT Governance Portal, aka: GCSS-AF.com) Run-Time Governance N/A Ex: AmberPoint Service Discovery Web Service Repository Web Services Registry Service Security Web Service Proxy Access Management Identity Management Federation Reduced Sign On (RSO) Integration Service Mediation Hardware Mediation Software Mediation Machine to Machine (M2M) Messaging Enterprise Service Bus (ESB) ESB Flat File Processing Business Process (BPEL) Orchestration Business Process (BPEL) Engine EIT-GP (GCSS-AF EIT Governance Portal, aka: GCSS-AF.com) HP Systinet DataPower XI50 SOA Appliance Tivoli Access Manager Tivoli Identity Manager Tivoli Federated Identity Manager Tivoli Access Manager DataPower XI50 SOA Appliance ESB Mediation, Informatica MQSeries, Message Broker ESB and DataPower XI50 SOA Appliance IBM Process Server, Oracle BPM Server Enterprise Service Management (ESM) URI Monitoring HP Site Scope DISA Provided Web Services Monitoring N/A Ex: AmberPoint Web Services Runtime Policy Enforcement N/A Ex: AmberPoint Web Application Servers Java Java.NET Extract, Transform, Load (ETL) Informatica Suite IBM Oracle Microsoft NOTE: Complete GCSS-AF Product and Version Listing: https://www.gcss-af.com/cfs/outreach/tools/vdd/ 9

Data Power XI50 SOA Integration and Security Appliance OVERVIEW XML-to-'Any' Conversion at Wirespeed Integrated message-level security X150 is a network device capable of transforming between disparate message formats, including binary, legacy, and XML, and providing message routing and security. XI50 can be used for costeffective XML enablement of mainframes, wirespeed enterprise message buses, and enterprise application integration Problems Solved: WS Application Integration Integrates SOA and Web services deployments Transforms between disparate message formats (binary, legacy, XML, etc.) Bridges wireline transport-level protocols (HTTP, MQ, FTP, JMS, TIBCO EMS, etc.) Security Features: XML/SOAP Firewall - Filter on any content, metadata or network variables Web Application Firewall - Cookie rewriting, HTTP header injection /suppression Data Validation - Approve incoming/outgoing XML and SOAP at wirespeed XML Threat Protection - Mitigate risk from new and emerging application-layer threats XML Security - Encrypt and sign message/fields, provide message confidentiality and integrity Web Services Access Control - SAML, WS-Security, LDAP, Kerberos, LTPA, RADIUS, digital certificates, usernames /passwords, etc. MultiStep and XML/SOAP Routing - Sophisticated multi-stage pipeline Web Services Management - Secure Web services proxy, Service-Level Management (SLM) Transport Layer Flexibility - SSL acceleration; secure insecure zone bridging Service Virtualization - Reverse proxy masks endpoints and back-end resources Configuration and Administration - Ease of use, integration for management Extensibility - Extending the base functionality using standards-based approaches 10

Web Services Security - Enterprise Proxy Approach Supports internal, external and federated service access. Service Messaging and Security Extensions The entire process takes place in between the requesting client and hosted service. Clients remain unaware of the entire process, while the intended Web services do not have to be concerned with performing security functions. Advantages: Mitigates and protects against the major categories and many types of security threats to Web services and messaging. Security functions can be performed directly by the proxy rather than being implemented in the actual applications and services. Security functions are hidden from clients, who remain unaware of the process. Bi-directional security protects both the client and service provider. Web services are concealed by the proxy, which only establishes a connection for authorized clients. Web service providers are not affected by the function of the proxy, as it is an independent entity. Proxies can be easily added and removed to and from an architecture depending on system and service needs. The proxy promotes loose coupling and the separation of distinct services. 11

Modern/Legacy Mediation: Web Services to/from Flat Files Change Request #1963 Web Service Sent to Flat File Recipient (w/data mediation) Flat File Sent to Web Service Recipient (w/data mediation) Production Configuration: ESB DataPower XI50s Authentication and Access Web Service Management GUI Tool Web App Servers (Java and.net) ESB 12

Web Services Security Proxy Sequence of Events Security Controls Business Logic When a SOAP message is sent from a client to a Web service application protected by the GCSS-AF Web service proxy, the following process occurs each time: 1) The Web service client prepares the SOAP request, populating the SOAP header with a X.509 binary security token. 2) Upon receipt of the message, the Web service proxy examines the X.509 binary security token signature for authenticity. If the signature is invalid, indicating some form of tampering occurred, a SOAP fault is returned to the Web service client. If the signature is valid, the next step in the process occurs. 3) A valid X.509 certificate associated with the X.509 binary security token is used to authenticate a service user through an access manager, which is an integrated COTS solution used for authorization and identity management. If the service user cannot be identified, a SOAP fault is returned to the Web service client. 4) If the service user is identified, the access manager begins authorizing the client based on the Web Service method. If the service user is not authorized to access the Web service method, a SOAP fault is returned to the Web service client. 5) If the service user IS AUTHENTICATED AND AUTHORIZED to call the Web service method, the Web service proxy calls the protected Web service method, and the data is returned to the Web service client. 13

REST Service Support REST services are more free-form than Web Services and don t provide a WSDL which serves as the basis for the web service proxy configuration We lose the ws-security extensions and would therefore require mutual authn on all REST connections XML validation and acceleration provided by DP would also be impacted Bottom line is that we can support REST via DataPower Some design work is needed for those services since the wsdl and soap elements shown on the previous slides are not supported by REST services It may make sense to secure REST services via WebSEAL security junctions 14

Consuming Web Services (5 Steps) 1 2 3 4 5 Find It! View It! Secure It! Connect It! Governance Process Consume It! EIT-Governance Portal Services Repository (www.gcss-af.com) Workplans (Governance/Permissions) Descriptions, Guides WSDL XML Schemas X.509 Certificate (Authentication) Use AF Process for obtaining certificate TAM Roles (Authorization) Java and.net Web Services SOAP XML Payload XML Schemas Transformations Contact Outreach Support 15

Developer s Tips Contact Outreach to discuss your data needs Outreach has Web Service and DataPower Expertise Complete a Work Plan on EIT-GP Open Change Requests and Follow Up w/gcss-af if you need additional capabilities Develop and Test your Web Service in the CIE Full installation of GCSS-AF in CIE for development/testing Including ESB and DataPower XI50 16

Resources An Introduction to IBM Rational Application Developer ISBN-13: 978-1-931182-22-5 IBM WebSphere DataPower SOA Appliance Handbook ISBN-13: 978-0-13-714819-6 IBM SOA and Web Services Developer s Website: http://www.ibm.com/developer works/webservices IBM SOA Sandbox http://www.ibm.com/developer works/downloads/soasandbox/? S_TACT=105AGX04&S_CMP=HP 17

BACKUP 18

DataPower Web Service Proxy Test Example public class GcssAfWsProxyTest { } private static EngineConfiguation createclientconfig() { SimpleProvider clientconfig = new SimpleProvider(); Handler securityhandler = (Handler)new WSDoAllSender(); securityhandler.setoption(wshandlerconstants.action, WSHandlerConstants.SIGNATURE); securityhandler.setoption(wshandlerconstants.user, gcss-af-ws-proxy-test-user"); securityhandler.setoption(wshandlerconstants.password_type, WSConstants.PW_TEXT); securityhandler.setoption(wshandlerconstants.sib_prop_file, client_crypto.properties"); securityhandler.setoption(wshandlerconstants.sig_key_id, "DirectReference"); securityhandler.setoption(wshandlerconstants.pw_callback_class, "smartdemo.pwcallback"); SimpleChain reqhandler = new SimpleChain(); SimpleChain reshandler = new SimpleChain(); reqhandler.addhandler(securityhandler); resphandler.addhandler(securityhandler); Handler pivot = (Handler)new HTTPSender(); Handler transport = new SimpleTargetedChain(reqHandler, pivot, resphandler); clientconfig.deploytransport(httptransport.default_transport_name,transport); return clientcofig; } public static void main(string[] args) { try { System.setProperty( "javax.net.ssl.truststore", "jssecacerts"); System.setProperty( "javax.net.ssl.truststorepassword", "changeit"); java.net.url url = new java.net.url ( "url to web service"); SmartWebServicesLocator locator = new SmartWebServicesLocator(); EngineConfiguration clientconfig = createclientconfig(); locator.setengineconfiguration(clientconfig); locator.setengine(new AxisClient(clientConfig)); SmartWebServiceSoap client = locator.getsmartwebservicessoap(url); String response = client.getacquisitiongrouplist(498); System.out.println(response); } catch ( Exception e ) { e.printstacktrace(); } } 19

SOAP Request, WS-Security 1.0 Binary Security Token with Client Signature <soapenv:envelope xmlns:mil="http://mil.af.smart.webservices" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <soapenv:header> <wsse:security soapenv:mustunderstand="1" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"> <wsse:binarysecuritytoken EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary" ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3" wsu:id="certid-19551676" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"> </wsse:binarysecuritytoken> <ds:signature Id="Signature-8092433" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"> <ds:signedinfo> <ds:canonicalizationmethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/> <ds:signaturemethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/> <ds:reference URI="#id-13592751"> <ds:transforms> <ds:transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/> Signature Reference </ds:transforms> <ds:digestmethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/> <ds:digestvalue>bvvbbtuhupfbfofnfqjehjn2wfy=</ds:digestvalue> Signed Body </ds:reference> </ds:signedinfo> WS-Security Binary Security Token <ds:signaturevalue>pclxgjqfscp/xjsc43uj4nxrzp32g/eqzcpwehy0hd1bt4+p7oecd49ccds1tmivq8cqxbbm9tbxpw6ze7tpuiaqrfa3huwlzaqi7bmrrtzdjn/lq 3Cp7m/3Ly1VmREXpryROw25ms12JQwBWcErpaqxEovudHe7ffy9jYBwWoo=</ds:SignatureValue> <ds:keyinfo Id="KeyId-24401596"> <wsse:securitytokenreference wsu:id="strid-15724536" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility- 1.0.xsd"> <wsse:reference URI="#CertId-19551676" ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3"/> </wsse:securitytokenreference> </ds:keyinfo> </ds:signature> <wsu:timestamp wsu:id="timestamp-25752838" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"> <wsu:created>2008-06-24t19:10:27.741z</wsu:created> <wsu:expires>2008-06-24t19:15:27.741z</wsu:expires> </wsu:timestamp> </wsse:security> </soapenv:header> <soapenv:body wsu:id="id-13592751" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"> <mil:getacquisitiongrouplist> <mil:acquisitiongrouplistrequestdata> <mil:rootacquisitiongroupid>498</mil:rootacquisitiongroupid> </mil:acquisitiongrouplistrequestdata> </mil:getacquisitiongrouplist> </soapenv:body> </soapenv:envelope> 20

SOAP Response, WS-Security 1.0 Binary Security Token with ServerSignature <soap:envelope xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsi="http://www.w3.org/2001/xmlschema-instance" xmlns:xsd="http://www.w3.org/2001/xmlschema"> <soapenv:header xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <wsse:security soapenv:mustunderstand="1" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"> <wsu:timestamp wsu:id="timestamp-a4fc714d-bb0f-4dbb-bda7-a0bce11c7762" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wsswssecurity-utility-1.0.xsd"> <wsu:created>2008-06-24t19:12:12z</wsu:created> <wsu:expires>2008-06-24t19:17:12z</wsu:expires> </wsu:timestamp> <wsse:binarysecuritytoken wsu:id="securitytoken-52d5e357-c71f-4e26-9d58-661afca1a3ae" EncodingType="http://docs.oasisopen.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary" ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wssx509-token-profile-1.0#X509v3" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility- 1.0.xsd"> </wsse:binarysecuritytoken> <Signature xmlns="http://www.w3.org/2000/09/xmldsig#"> <SignedInfo> <CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/> <SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/> <Reference URI="#Body-adec4fad-7f93-4189-be7e-5231b8c44c94"> <Transforms> <Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/> </Transforms> <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/> <DigestValue>yOkGiRm2xIx97APjTl8lC38luLE=</DigestValue> </Reference> </SignedInfo> WS-Security Binary Security Token Signature Reference Signed Body <SignatureValue>hW00aGrz3p65s5Ouno0obtMc+mCNcbetwuIPGv2VWDCY09jpHgcDb6Mr4QxQbPx4ArNFSI669TIOl8z/jQDr2xqv/3TrDH16jVWq5qOzqoulqs8wzd mnv5j3hrsaax2elnn9hgb88qr7nevfzkcj/xbprmwq3o2sr/ohqgutr5q=</signaturevalue> <KeyInfo> <wsse:securitytokenreference xmlns=""> <wsse:reference URI="#SecurityToken-52d5e357-c71f-4e26-9d58-661afca1a3ae" ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401- wss-x509-token-profile-1.0#x509v3"/> </wsse:securitytokenreference> </KeyInfo> </Signature> </wsse:security> </soapenv:header> <soap:body wsu:id="body-adec4fad-7f93-4189-be7e-5231b8c44c94" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurityutility-1.0.xsd"> <GetAcquisitionGroupListResponse xmlns="http://mil.af.smart.webservices"> <AcquisitionGroupListResponseData> </AcquisitionGroupListResponseData> </GetAcquisitionGroupListResponse> </soap:body> </soap:envelope> 21

Echo Web Service Example package com.ibm.was.wssample.sei.echo; import java.net.malformedurlexception; import java.net.url; import javax.xml.namespace.qname; import javax.xml.ws.service; import javax.xml.ws.webendpoint; import javax.xml.ws.webserviceclient; /** * This class was generated by the JAXWS SI. * JAX-WS RI 2.0_01-b15-fcs * Generated source version: 2.0 */ @WebServiceClient(name = "EchoService", targetnamespace = "http://com/ibm/was/wssample/sei/echo/", wsdllocation = "WEB-INF/wsdl/Echo.wsdl") public class EchoService extends Service { private final static URL ECHOSERVICE_WSDL_LOCATION; static { URL url = null; try { url = new URL("file:/WEB-INF/wsdl/Echo.wsdl"); } catch (MalformedURLException e) { e.printstacktrace(); } ECHOSERVICE_WSDL_LOCATION = url; } public EchoService(URL wsdllocation, QName servicename) { super(wsdllocation, servicename); } public EchoService() { super(echoservice_wsdl_location, new QName("http://com/ibm/was/wssample/sei/echo/", "EchoService")); } /** * @return * returns EchoServicePortType */ @WebEndpoint(name = "EchoServicePort") public EchoServicePortTypeClient getechoserviceport() { return (EchoServicePortTypeClient)super.getPort(new QName("http://com/ibm/was/wssample/sei/echo/", "EchoServicePort"), EchoServicePortTypeClient.class); } } 22

ESB Architecture Process Engine NIPR SIPR Process Engine Legacy System Domain App Domain App Domain App Domain App Legacy System FTP Adapter ESB Cross-Domain Service ESB Legacy System ERP Module AFKS NIPR Portal SIPR Portal 23

DataPower XI50 Reference Architecture 24