(Chapter 24, section 1)
In this section, we will discuss the roles required to access the relevant run time tools. We will look at how various sets of permissions acting on clusters of composite applications can be withheld or granted. Finally we discuss how to hide sensitive pieces of information from administrator’s eyes through encryption.
Supporting Resources
The sources for this section are found in folder ch24.
Blog article Encryption and Decryption of Sensitive Data (in SOA Composites)
Documentation
Service Bus – Access Security
SCA runtime Securing Access to Partitions