Human Access to Run Time SOA Suite Tooling

(Chapter 24, section 1)

In this section, we will discuss the roles required to access the relevant run time tools. We will look at how various sets of permissions acting on clusters of composite applications can be withheld or granted. Finally we discuss how to hide sensitive pieces of information from administrator’s eyes through encryption.

Supporting Resources

The sources for this section are found in folder ch24.

Blog article Encryption and Decryption of Sensitive Data (in SOA Composites)


Service Bus – Access Security

SCA runtime Securing Access to Partitions

Securing Programmatic Access to SOA Suite APIs

Hiding Sensitive Data in Composite Message processing

Geef een reactie

Het e-mailadres wordt niet gepubliceerd. Verplichte velden zijn gemarkeerd met *

De volgende HTML tags en attributen zijn toegestaan: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>