Book Image

Oracle SOA Infrastructure Implementation Certification Handbook (1Z0-451)

By : Kathiravan Udayakumar
Book Image

Oracle SOA Infrastructure Implementation Certification Handbook (1Z0-451)

By: Kathiravan Udayakumar

Overview of this book

<p>Completing the Oracle SOA Infrastructure Implementation Certification develops your conceptual and real-world understanding of the primary components of the Oracle SOA Suite, including BPEL process engine and Oracle Service Bus and will allow you to become familiar with Service Oriented Architecture concepts.<br /><br /><br />This definitive certification guide provides a disciplined approach to be adopted for successfully clearing the 1Z0-451 Oracle SOA Foundation Practitioner exam to attain the Oracle SOA Infrastructure Implementation Certification.<br /><br />The book starts with essential SOA concepts and then dives into building of composite applications. You will then learn how to work with technology and application adapters. Next, you will learn orchestrating Services with BPEL and advanced BPEL concepts. Midway through the book you will learn about Mediator components and Human Workflows. The book will then cover Oracle Business Rules and securing services and composite applications. Towards the end of the book, you will learn how to monitor and manage SOA Deployment. The book concludes&nbsp; with a post assessment exam that will give you a feel for the actual SOA Foundation Practitioner exam, and a must-have developer reference that covers important SOA concepts.</p>
Table of Contents (22 chapters)
Oracle SOA Infrastructure Implementation Certification Handbook (1Z0-451)
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Pre-assessment Test
Post-assessment Test

Web Services and composite security


Web Services' security requirements involve credential transfer and service capabilities along with defining application constraints. In many cases, Web Services security tools, such as Oracle WSM, rely on Public Key Infrastructure (PKI) environments. A PKI uses cryptographic keys. Keys can be private or public. In an asymmetric cipher model, the receiving party's public key is used to encrypt plaintext, and the receiving party's matching private key is used to decrypt the ciphertext. Also, a private key is used to create a digital signature by signing the message and the public key is used for verifying the signature. Public-key certificates (or certificates, for short) are used to guarantee the integrity of public keys.

Web Services' security requirements are supported by industry standards both at the transport level (Secure Socket Layer) and at the application level, relying on XML frameworks.

Oracle Web Services Manager is designed to define and...