TEC Workbook - IBM
TEC Workbook - IBM TEC Workbook - IBM
An IBM Proof of Technology Catalog Number © Copyright IBM Corporation, 2011 US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
Contents IBM Software CONNECTION PARAMETERS SPREADSHEET ........................................................................................................................... 5 LAB 1 OVERVIEW ......................................................................................................................................................... 6 1.1 INTRODUCTION ........................................................................................................................................ 6 1.2 REQUIREMENTS ....................................................................................................................................... 6 1.3 ICONS ..................................................................................................................................................... 6 1.4 INTRODUCTION TO WEBSPHERE DATAPOWER SOA APPLIANCES ................................................................. 7 1.5 WEBSPHERE DATAPOWER SOA APPLIANCES FAMILY ................................................................................ 7 1.6 ACCESS CONTROL ................................................................................................................................... 8 1.7 APPLICATION DOMAINS ............................................................................................................................ 8 1.8 THE WEBSPHERE DATAPOWER WEBGUI .................................................................................................. 8 1.9 CONFIGURATION PROCEDURES ............................................................................................................... 12 1.10 WEBSPHERE DATAPOWER SERVICES...................................................................................................... 13 1.11 WEBSPHERE DATAPOWER FLASH-BASED FILE SYSTEM ............................................................................ 16 1.12 TROUBLESHOOTING TOOLS ..................................................................................................................... 20 1.13 LOGGING .............................................................................................................................................. 21 1.14 WEBSPHERE DATAPOWER SOA APPLIANCES FIRMWARE ......................................................................... 27 1.15 SUMMARY ............................................................................................................................................. 28 LAB 2 WORKING WITH XML ...................................................................................................................................... 29 2.1 SERVICE PROCESSING PHASES............................................................................................................... 29 2.2 CREATING THE MULTI-PROTOCOL GATEWAY SERVICE ............................................................................... 31 2.3 SCHEMA VALIDATION ............................................................................................................................. 38 2.4 SOAP ENVELOPE SCHEMA VALIDATION .................................................................................................. 42 2.5 CONTENT-BASED FILTERING ................................................................................................................... 43 2.6 TRANSFORMING WITH XSL AND XPATH.................................................................................................... 46 2.7 STYLESHEET CACHING ........................................................................................................................... 49 2.8 IMPLICIT XML THREAT PROTECTION ........................................................................................................ 49 2.9 SUMMARY ............................................................................................................................................. 52 LAB 3 SECURING XML MESSAGE CONTENT USING WS-SECURITY ................................................................... 53 3.1 PUBLIC KEY INFRASTRUCTURE (PKI) ....................................................................................................... 53 3.2 WS-SECURITY DIGITAL SIGNATURES ....................................................................................................... 54 3.3 WS-SECURITY ENCRYPTION & DECRYPTION ............................................................................................ 64 3.4 SUMMARY ............................................................................................................................................. 68 LAB 4 ACCESS CONTROL FRAMEWORK ............................................................................................................... 69 4.1 EXTRACT IDENTITY & EXTRACT RESOURCE ............................................................................................... 69 4.2 AUTHENTICATE ...................................................................................................................................... 69 4.3 CREDENTIAL AND RESOURCE MAPPING ..................................................................................................... 70 4.4 AUTHORIZE ........................................................................................................................................... 70 4.5 AUDIT & ACCOUNTING ............................................................................................................................ 70 4.6 LDAP AUTHENTICATION ......................................................................................................................... 70 4.7 SUMMARY ............................................................................................................................................. 72 APPENDIX A. NOTICES ........................................................................................................................................................ 129 APPENDIX B. TRADEMARKS AND COPYRIGHTS ............................................................................................................. 131 Contents Page 3
- Page 1: WebSphere Lab Jam Connectivity WebS
- Page 5 and 6: Connection Parameters Spreadsheet I
- Page 7 and 8: 1.4 Introduction to WebSphere DataP
- Page 9 and 10: IBM Software You’re now ready to
- Page 11 and 12: There are several areas in the WebG
- Page 13 and 14: 1.10 WebSphere DataPower Services I
- Page 15 and 16: IBM Software Gateway supports WebSp
- Page 17 and 18: cert: Directory Usage IBM Software
- Page 19 and 20: __7. Click on the small plus sign t
- Page 21 and 22: 1.13 Logging IBM Software WebSphere
- Page 23 and 24: ● Trigger a set of actions to occ
- Page 25 and 26: 1.13.4 Appliance management IBM Sof
- Page 27 and 28: 1.13.8 Configuration Comparison, Ch
- Page 29 and 30: Lab 2 Working with XML Prerequisite
- Page 31 and 32: 2.1.5 WebSphere DataPower Configura
- Page 33 and 34: IBM Software It’s also possible t
- Page 35 and 36: Match Rule - evaluate statements us
- Page 37 and 38: IBM Software __18. In the Configure
- Page 39 and 40: IBM Software __2. Expand the policy
- Page 41 and 42: IBM Software __12. In soapUI, click
- Page 43 and 44: IBM Software __3. Click the green s
- Page 45 and 46: The SQL statement would become: SEL
- Page 47 and 48: __2. Click and drag a transform act
- Page 49 and 50: 2.7 Stylesheet Caching IBM Software
- Page 51 and 52: 2.8.3 Virus Scanning IBM Software V
An <strong>IBM</strong> Proof of Technology<br />
Catalog Number<br />
© Copyright <strong>IBM</strong> Corporation, 2011<br />
US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with <strong>IBM</strong> Corp.