TEC Workbook - IBM
TEC Workbook - IBM
TEC Workbook - IBM
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Contents<br />
<strong>IBM</strong> Software<br />
CONNECTION PARAMETERS SPREADSHEET ........................................................................................................................... 5<br />
LAB 1 OVERVIEW ......................................................................................................................................................... 6<br />
1.1 INTRODUCTION ........................................................................................................................................ 6<br />
1.2 REQUIREMENTS ....................................................................................................................................... 6<br />
1.3 ICONS ..................................................................................................................................................... 6<br />
1.4 INTRODUCTION TO WEBSPHERE DATAPOWER SOA APPLIANCES ................................................................. 7<br />
1.5 WEBSPHERE DATAPOWER SOA APPLIANCES FAMILY ................................................................................ 7<br />
1.6 ACCESS CONTROL ................................................................................................................................... 8<br />
1.7 APPLICATION DOMAINS ............................................................................................................................ 8<br />
1.8 THE WEBSPHERE DATAPOWER WEBGUI .................................................................................................. 8<br />
1.9 CONFIGURATION PROCEDURES ............................................................................................................... 12<br />
1.10 WEBSPHERE DATAPOWER SERVICES...................................................................................................... 13<br />
1.11 WEBSPHERE DATAPOWER FLASH-BASED FILE SYSTEM ............................................................................ 16<br />
1.12 TROUBLESHOOTING TOOLS ..................................................................................................................... 20<br />
1.13 LOGGING .............................................................................................................................................. 21<br />
1.14 WEBSPHERE DATAPOWER SOA APPLIANCES FIRMWARE ......................................................................... 27<br />
1.15 SUMMARY ............................................................................................................................................. 28<br />
LAB 2 WORKING WITH XML ...................................................................................................................................... 29<br />
2.1 SERVICE PROCESSING PHASES............................................................................................................... 29<br />
2.2 CREATING THE MULTI-PROTOCOL GATEWAY SERVICE ............................................................................... 31<br />
2.3 SCHEMA VALIDATION ............................................................................................................................. 38<br />
2.4 SOAP ENVELOPE SCHEMA VALIDATION .................................................................................................. 42<br />
2.5 CONTENT-BASED FILTERING ................................................................................................................... 43<br />
2.6 TRANSFORMING WITH XSL AND XPATH.................................................................................................... 46<br />
2.7 STYLESHEET CACHING ........................................................................................................................... 49<br />
2.8 IMPLICIT XML THREAT PRO<strong>TEC</strong>TION ........................................................................................................ 49<br />
2.9 SUMMARY ............................................................................................................................................. 52<br />
LAB 3 SECURING XML MESSAGE CONTENT USING WS-SECURITY ................................................................... 53<br />
3.1 PUBLIC KEY INFRASTRUCTURE (PKI) ....................................................................................................... 53<br />
3.2 WS-SECURITY DIGITAL SIGNATURES ....................................................................................................... 54<br />
3.3 WS-SECURITY ENCRYPTION & DECRYPTION ............................................................................................ 64<br />
3.4 SUMMARY ............................................................................................................................................. 68<br />
LAB 4 ACCESS CONTROL FRAMEWORK ............................................................................................................... 69<br />
4.1 EXTRACT IDENTITY & EXTRACT RESOURCE ............................................................................................... 69<br />
4.2 AUTHENTICATE ...................................................................................................................................... 69<br />
4.3 CREDENTIAL AND RESOURCE MAPPING ..................................................................................................... 70<br />
4.4 AUTHORIZE ........................................................................................................................................... 70<br />
4.5 AUDIT & ACCOUNTING ............................................................................................................................ 70<br />
4.6 LDAP AUTHENTICATION ......................................................................................................................... 70<br />
4.7 SUMMARY ............................................................................................................................................. 72<br />
APPENDIX A. NOTICES ........................................................................................................................................................ 129<br />
APPENDIX B. TRADEMARKS AND COPYRIGHTS ............................................................................................................. 131<br />
Contents Page 3