(Chapter 24, section 1)
In this section, we will discuss the roles required to access the relevant run time tools. We will look at how various sets of permissions acting on clusters of composite applications can be withheld or granted. Finally we discuss how to hide sensitive pieces of information from administrator’s eyes through encryption.
The sources for this section are found in folder ch24.
Blog article Encryption and Decryption of Sensitive Data (in SOA Composites)
Service Bus – Access Security
SCA runtime Securing Access to Partitions
Securing Programmatic Access to SOA Suite APIs