Book Image

Oracle SOA Suite 11g Administrator's Handbook

By : Arun Pareek, Ahmed Aboulnaga
Book Image

Oracle SOA Suite 11g Administrator's Handbook

By: Arun Pareek, Ahmed Aboulnaga

Overview of this book

Oracle SOA Suite 11g is the backbone of messaging and application integration in a service-oriented architecture. An application administrator is responsible for an end-to-end administration and management of the infrastructure. Understanding the underlying components, services, and configuration and their relations to each other is necessary to effectively administer the Oracle SOA Suite 11g environment. Due to its sheer size, administering Oracle SOA Suite 11g is a daunting task.This book provides detailed explanations of all the core administrative and management activities around Oracle SOA Suite. It includes compact information for end-to-end administration of Oracle SOA Suite 11g. It delves into advanced topics such as silent installs, cloning, backup and recovery and high availability installations.Using this book, you will be able to administer and secure your Oracle SOA Suite services and applications. You will follow examples that you can use in your everyday life as a SOA Suite administrator. The book begins with managing composite applications, their deployments and lifecycles and then moves on to monitoring instances, service engines, Weblogic Server and composite applications. With a detailed coverage of topics like the administration of individual service components as well as configuring MBeans using both Oracle Enterprise Manager Fusion Middleware Control and WLST-based scripts, you will be equipped to work with any services and applications.Towards the end, you will be taken through identifying faults & exceptions, troubleshooting approaches, and securing various components.
Table of Contents (16 chapters)
Oracle SOA Suite 11g Administrator's Handbook
About the Authors
About the Reviewers

Chapter 7. Configuring Security Policies for SOA Composites

Securing composite applications is a critical and pressing requirement especially in a service oriented environment where business processes need to interact with numerous external service providers, vendors, and trading partners. Setting up security at the infrastructure as well as the application level is of primary importance while dealing with both on premise (departmental or internal) and external web services such as cloud based, across DMZs (Demilitarized Zones), and so on.

Whether it's choosing when to use SSL for encrypted HTTP transport, authenticating and authorizing users across different systems, or preserving message integrity, significant effort is put into protecting information that is critical and privileged to businesses. A security exposure can be disastrous and, therefore, protecting data in business transactions is critical to reducing security related risks. Add to this the fact that security requirements...