Book Image

WSO2 Developer's Guide

By : Ramón Garrido, Fidel Prieto Estrada
Book Image

WSO2 Developer's Guide

By: Ramón Garrido, Fidel Prieto Estrada

Overview of this book

WSO2 Enterprise Integrator brings together the most powerful servers provided by the WSO2 company for your SOA infrastructure. As an Enterprise Service Bus (ESB), WSO2 Enterprise Integrator provides greater flexibility and agility to meet growing enterprise demands, whereas, as a Data Services Server (DSS), it provides an easy-to-use platform for integrating data stores, creating composite views across different data sources, and hosting data services. Using real-world scenarios, this book helps you build a solid foundation in developing enterprise applications with powerful data integration capabilities using the WSO2 servers. The book gets you started by brushing up your knowledge about SOA architecture and how it can be implemented through WSO2. It will help build your expertise with the core concepts of ESB such as building proxies, sequences, endpoints, and how to work with these in WSO2. Going further, you will also get well-acquainted with DSS data service concepts such as configuring data services, tasks, events, testing, and much more. The book will also cover API management techniques. Along with ESB and DSS, you will also learn about business process servers, the rules server and other components that together provide the control and robustness your enterprise applications will need. With practical use cases, the book covers typical daily scenarios you will come across while using these servers to give you hands-on experience.
Table of Contents (14 chapters)

Quality of Service

In the last chapter, we learned to create more advanced services that can perform different actions depending on some external information such as query parameters, input requests, body, or headers. Chapter 6, Conditional Route, was the last chapter of the series of chapters with the main purpose of adding functionality to the services. Now in this chapter, we will focus on the quality of services, in which we will discover how to configure our services with security, throttling, and caching in order to create more realistic services with better performance and real-world security scenarios. With the security configuration, we can set up 16 different scenarios for handling the basic principles of security: authentication, availability, confidentiality, integrity, and non-repudiation:

  1. Authentication: The act of verifying that one user is really that user and...