TEC Workbook - IBM

TEC Workbook - IBM TEC Workbook - IBM

23.02.2013 Views

An IBM Proof of Technology Catalog Number © Copyright IBM Corporation, 2011 US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

Contents IBM Software CONNECTION PARAMETERS SPREADSHEET ........................................................................................................................... 5 LAB 1 OVERVIEW ......................................................................................................................................................... 6 1.1 INTRODUCTION ........................................................................................................................................ 6 1.2 REQUIREMENTS ....................................................................................................................................... 6 1.3 ICONS ..................................................................................................................................................... 6 1.4 INTRODUCTION TO WEBSPHERE DATAPOWER SOA APPLIANCES ................................................................. 7 1.5 WEBSPHERE DATAPOWER SOA APPLIANCES FAMILY ................................................................................ 7 1.6 ACCESS CONTROL ................................................................................................................................... 8 1.7 APPLICATION DOMAINS ............................................................................................................................ 8 1.8 THE WEBSPHERE DATAPOWER WEBGUI .................................................................................................. 8 1.9 CONFIGURATION PROCEDURES ............................................................................................................... 12 1.10 WEBSPHERE DATAPOWER SERVICES...................................................................................................... 13 1.11 WEBSPHERE DATAPOWER FLASH-BASED FILE SYSTEM ............................................................................ 16 1.12 TROUBLESHOOTING TOOLS ..................................................................................................................... 20 1.13 LOGGING .............................................................................................................................................. 21 1.14 WEBSPHERE DATAPOWER SOA APPLIANCES FIRMWARE ......................................................................... 27 1.15 SUMMARY ............................................................................................................................................. 28 LAB 2 WORKING WITH XML ...................................................................................................................................... 29 2.1 SERVICE PROCESSING PHASES............................................................................................................... 29 2.2 CREATING THE MULTI-PROTOCOL GATEWAY SERVICE ............................................................................... 31 2.3 SCHEMA VALIDATION ............................................................................................................................. 38 2.4 SOAP ENVELOPE SCHEMA VALIDATION .................................................................................................. 42 2.5 CONTENT-BASED FILTERING ................................................................................................................... 43 2.6 TRANSFORMING WITH XSL AND XPATH.................................................................................................... 46 2.7 STYLESHEET CACHING ........................................................................................................................... 49 2.8 IMPLICIT XML THREAT PROTECTION ........................................................................................................ 49 2.9 SUMMARY ............................................................................................................................................. 52 LAB 3 SECURING XML MESSAGE CONTENT USING WS-SECURITY ................................................................... 53 3.1 PUBLIC KEY INFRASTRUCTURE (PKI) ....................................................................................................... 53 3.2 WS-SECURITY DIGITAL SIGNATURES ....................................................................................................... 54 3.3 WS-SECURITY ENCRYPTION & DECRYPTION ............................................................................................ 64 3.4 SUMMARY ............................................................................................................................................. 68 LAB 4 ACCESS CONTROL FRAMEWORK ............................................................................................................... 69 4.1 EXTRACT IDENTITY & EXTRACT RESOURCE ............................................................................................... 69 4.2 AUTHENTICATE ...................................................................................................................................... 69 4.3 CREDENTIAL AND RESOURCE MAPPING ..................................................................................................... 70 4.4 AUTHORIZE ........................................................................................................................................... 70 4.5 AUDIT & ACCOUNTING ............................................................................................................................ 70 4.6 LDAP AUTHENTICATION ......................................................................................................................... 70 4.7 SUMMARY ............................................................................................................................................. 72 APPENDIX A. NOTICES ........................................................................................................................................................ 129 APPENDIX B. TRADEMARKS AND COPYRIGHTS ............................................................................................................. 131 Contents Page 3

An <strong>IBM</strong> Proof of Technology<br />

Catalog Number<br />

© Copyright <strong>IBM</strong> Corporation, 2011<br />

US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with <strong>IBM</strong> Corp.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!