TEC Workbook - IBM
TEC Workbook - IBM TEC Workbook - IBM
IBM Software 1.10.3 XML Firewall The XML Firewall is a general purpose HTTP(S) service that can process both XML and non- XML payloads. A wide array of actions can be applied to both inbound and outbound messages, such as encryption/decryption, digital signatures, XSL transformations, filtering, schema validation, and dynamic routing to name just a few. Checks for XML threats are provided automatically. Processing policies have access to all HTTP related details (headers, form fields, payload, status, etc.) for both the request and the response and can therefore make decisions or process messages based on the header’s existence or contents. A robust authentication and authorization engine, with built-in integration for a wide variety of policy servers (LDAP, IBM Tivoli® Access Manager, Kerberos/SPNEGO, IBM RACF®, etc.) can apply simple to complex security policies to both inbound and outbound messages. Security protocol mediation, such as HTTP Basic Authentication to SAML, or Kerberos/SPNEGO to IBM Lightweight Third-Party Authentication (LTPA), is easily configured through the WebGUI. There’s support for the latest security standards such as XACML, SAML, WS-Security, WS-Policy and WS-I Basic Profile. The XML Firewall also includes support for some of the latest WS-* standards, including WS-Reliable Messaging and WS-Addressing. 1.10.4 Multi-Protocol Gateway The Multi-Protocol Gateway service builds on the XML Firewall’s XML and security functionality by adding support for multiple protocols. In addition to HTTP and HTTPS, the Multi-Protocol Page 14 WebSphere Lab Jam
IBM Software Gateway supports WebSphere MQ, WebSphere JMS, TibcoEMS, FTP(S), SFTP, NFS and IMS. All of these protocols can be mixed and matched as necessary. Messages received over HTTPS can easily be routed to WebSphere MQ or JMS. 1.10.5 Web Service Proxy The Web Service Proxy provides all of the same services as a Multi-Protocol Gateway service; however it provides automatic configuration based on one or more Web Service Definition Language (WSDL) files. WSDL files may be obtained through subscriptions to a Universal Description, Discovery, and Integration (UDDI) or WebSphere Service Registry and Repository. A single Web Service Proxy object can act as a single point of entry for multiple WSDLs, automatically routing (or redirecting) the requests to the appropriate backend service. The Web Service Proxy will automatically apply schema validation to both inbound and outbound messages, further assuring message validity. Processing and security policies can be applied not only at the entire service level, but for individual operations within the service as well. Lab 1 – Introduction WebSphere DataPower SOA Appliances Page 15
- Page 1 and 2: WebSphere Lab Jam Connectivity WebS
- Page 3 and 4: Contents IBM Software CONNECTION PA
- Page 5 and 6: Connection Parameters Spreadsheet I
- Page 7 and 8: 1.4 Introduction to WebSphere DataP
- Page 9 and 10: IBM Software You’re now ready to
- Page 11 and 12: There are several areas in the WebG
- Page 13: 1.10 WebSphere DataPower Services I
- Page 17 and 18: cert: Directory Usage IBM Software
- Page 19 and 20: __7. Click on the small plus sign t
- Page 21 and 22: 1.13 Logging IBM Software WebSphere
- Page 23 and 24: ● Trigger a set of actions to occ
- Page 25 and 26: 1.13.4 Appliance management IBM Sof
- Page 27 and 28: 1.13.8 Configuration Comparison, Ch
- Page 29 and 30: Lab 2 Working with XML Prerequisite
- Page 31 and 32: 2.1.5 WebSphere DataPower Configura
- Page 33 and 34: IBM Software It’s also possible t
- Page 35 and 36: Match Rule - evaluate statements us
- Page 37 and 38: IBM Software __18. In the Configure
- Page 39 and 40: IBM Software __2. Expand the policy
- Page 41 and 42: IBM Software __12. In soapUI, click
- Page 43 and 44: IBM Software __3. Click the green s
- Page 45 and 46: The SQL statement would become: SEL
- Page 47 and 48: __2. Click and drag a transform act
- Page 49 and 50: 2.7 Stylesheet Caching IBM Software
- Page 51 and 52: 2.8.3 Virus Scanning IBM Software V
- Page 53 and 54: Lab 3 Securing XML Message Content
- Page 55 and 56: 3.2.2 Create the Crypto Key and Cer
- Page 57 and 58: 3.2.7 Verifying the request signatu
- Page 59 and 60: __8. Click the Close Window link to
- Page 61 and 62: __12. Click on the small [+] to sho
- Page 63 and 64: IBM Software __3. Click on the last
<strong>IBM</strong> Software<br />
Gateway supports WebSphere MQ, WebSphere JMS, TibcoEMS, FTP(S), SFTP, NFS and IMS. All of<br />
these protocols can be mixed and matched as necessary. Messages received over HTTPS can easily be<br />
routed to WebSphere MQ or JMS.<br />
1.10.5 Web Service Proxy<br />
The Web Service Proxy provides all of the same services as a Multi-Protocol Gateway service;<br />
however it provides automatic configuration based on one or more Web Service Definition<br />
Language (WSDL) files. WSDL files may be obtained through subscriptions to a Universal<br />
Description, Discovery, and Integration (UDDI) or WebSphere Service Registry and Repository. A single<br />
Web Service Proxy object can act as a single point of entry for multiple WSDLs, automatically routing (or<br />
redirecting) the requests to the appropriate backend service.<br />
The Web Service Proxy will automatically apply schema validation to both inbound and outbound<br />
messages, further assuring message validity. Processing and security policies can be applied not only at<br />
the entire service level, but for individual operations within the service as well.<br />
Lab 1 – Introduction WebSphere DataPower SOA Appliances Page 15