Student Guide - Oracle SOA Suite 11g Essential Concepts Volume 1

404 14 0
  • Loading ...
1/404 trang
Tải xuống

Thông tin tài liệu

Ngày đăng: 25/11/2016, 19:24

Oracle SOA Suite 11g: Essential Concepts Volume - Student Guide D58786GC10 Edition 1.0 August 2009 D61580 Authors Copyright © 2009, Oracle All rights reserved Bijoy Choudhury Disclaimer Swarnapriya Shridhar This document contains proprietary information and is protected by copyright and other intellectual property laws You may copy and print this document solely for your own use in an Oracle training course The document may not be modified or altered in any way Except where your use constitutes "fair use" under copyright law, you may not use, share, download, upload, copy, print, display, perform, reproduce, publish, license, post, transmit, or distribute this document in whole or in part without the express authorization of Oracle Technical Contributors and Reviewers Cathy Lippert Dave Berry Holger Dindler Rasmussen Heidi Buelow Demed L'Her Prasen Palvankar Tom Hardy David Shaffer James Mills Jai Kasi Magnus Kling Mathias Kullberg Matthew Slingsby Vasiliy Strelnikov Vikas Jain Glenn Stokol Pete Laseau Nagavalli Pataballa William Prewitt Editors Vijayalakshmi Narasimhan Daniel Milne Arijit Ghosh Graphic Designer Rajiv Chandrabhanu Satish Bettegowda Publishers Giri Venugopal Michael Sebastian Almeida Jobi Varghese The information contained in this document is subject to change without notice If you find any problems in the document, please report them in writing to: Oracle University, 500 Oracle Parkway, Redwood Shores, California 94065 USA This document is not warranted to be error-free Restricted Rights Notice If this documentation is delivered to the United States Government or anyone using the documentation on behalf of the United States Government, the following notice is applicable: U.S GOVERNMENT RIGHTS The U.S Government’s rights to use, modify, reproduce, release, perform, display, or disclose these training materials are restricted by the terms of the applicable Oracle license agreement and/or the applicable U.S Government contract Trademark Notice Oracle is a registered trademark of Oracle Corporation and/or its affiliates Other names may be trademarks of their respective owners Contents I Introduction Course Objectives I-2 Course Agenda: Day I-3 Course Agenda: Day I-4 Course Agenda: Day I-5 Summary I-6 Service-Oriented Architecture Concepts Course Road Map 1-2 Objectives 1-3 Definition: Service-Oriented Architecture (SOA) 1-4 Why SOA? 1-5 Enterprise Challenge 1-7 Point-to-Point Integration 1-8 Enterprise Application Integration 1-9 Example of Application-Centric Integration 1-10 Integrating Solutions and Benefits with SOA 1-11 SOA Further Defined 1-12 Moving Toward Service-Centric Integration 1-13 SOA: A Paradigm Shift 1-14 The Eight-Domain Model Approach for SOA 1-15 Quiz 1-17 Building an SOA Reference Architecture: From Architecture Drivers to a Roadmap 1-18 SOA Reference Architecture 1-19 SOA Reference Architecture: Service Consumers 1-21 SOA Reference Architecture: Service Classification 1-22 SOA Reference Architecture: Service Providers 1-23 Reference Architecture: Example 1-24 Standards That Enable SOA 1-25 Quiz 1-27 Service and Web Service 1-28 Types of Service Access and Implementation 1-29 Ways to Integrate Services 1-30 Designing with an SOA Approach 1-31 Creating Service Portfolios 1-32 SOA Workflow and Orchestration 1-33 Implementing SOA: General Concepts 1-34 Quiz 1-35 Define SOA Governance 1-36 Identifying the Need of SOA Governance 1-37 SOA Governance Framework 1-38 Quiz 1-39 Course Practice Scenario: Purchase Order Processing 1-40 Summary 1-41 Practice Overview: Preparing the Business Flow Diagram 1-42 iii Implementing SOA with Oracle SOA Suite Course Roadmap 2-2 Objectives 2-3 Basic Components of an SOA Infrastructure 2-4 Oracle SOA Suite 11g Components 2-5 Introduction to Service Infrastructure 2-7 Introducing SCA in Oracle SOA Suite 11g 2-8 Defining a Composite Application 2-9 Introducing Oracle Mediator Component 2-11 Describing the Features of Oracle Mediator Component 2-12 Introducing Oracle BPEL Process Component 2-13 Introducing Business Rules Component 2-14 Introducing Human Task Component 2-15 Quiz 2-16 Introduction to Business Activity Monitoring 2-17 Monitoring Services with BPEL and BAM 2-18 Oracle Enterprise Manager 2-19 Oracle WebLogic Server 10.3 2-21 WebLogic Server Domain 2-22 WebLogic Server Servers 2-24 Administration Server 2-25 Managed Server 2-26 WebLogic Server Machines 2-27 SOA Development with Oracle JDeveloper 2-28 Creating Connections in Oracle JDeveloper 2-29 Creating an Application Server Connection in Oracle JDeveloper 2-31 Goals of Implementing SOA Application with Oracle SOA Suite 11g 2-33 Quiz 2-34 Summary 2-36 Practice Overview: Creating Connections in JDeveloper 2-37 SOA Governance and Service Life-Cycle Management Course Roadmap 3-2 Objectives 3-3 Define Service Life-Cycle Management 3-4 Phases of Service Life Cycle 3-5 The Need for Service Life-Cycle Management 3-6 Define SOA Governance 3-7 Relationship of Governance Disciplines 3-8 The Need for SOA Governance 3-9 Benefits of SOA Governance 3-10 Center of Excellence: Key to SOA Success 3-11 Example of Governance Organizational Structure 3-12 Quiz 3-13 Service Life-Cycle Governance 3-14 Service Management 3-16 Service Portfolio 3-17 Policy Manager 3-18 Service Routing 3-19 Service Versioning 3-20 iv SLA Management 3-21 Quiz 3-22 Constituents of SOA Governance Model 3-23 End-to-End SOA Governance 3-25 End-to-End SOA Governance: SOA Asset Management 3-26 End-to-End SOA Governance: Policy Management and Enforcement 3-27 End-to-End SOA Governance: Consumer Management 3-28 End-to-End SOA Governance: SOA Monitoring and Management 3-29 SOA Governance Solution 3-30 Oracle SOA Governance Solution 3-31 Quiz 3-32 Summary 3-33 Practice Overview: Defining Policies for a Group of Services 3-34 Designing Services for SOA Implementations Course Roadmap 4-2 Objectives 4-3 Defining Services 4-4 Services Are SOA Building Blocks 4-5 Service Contract 4-6 Service Design 4-8 Service Granularity 4-9 Service Design Principles 4-10 Designing Coarse-Grained Interfaces 4-12 Quiz 4-13 Service Classifications 4-14 Connectivity Services 4-15 Data Services 4-16 Business Services 4-17 Business Process Services 4-18 Presentation Services 4-19 Service Infrastructure 4-20 Quiz 4-21 Basic Service Interaction Patterns 4-22 Synchronous Interactions 4-23 Asynchronous Interactions 4-24 Choosing Service Implementation Styles 4-25 Fundamentals for Creating a Service 4-27 Building a Portfolio of Services 4-28 Describing a Web Service 4-29 Web Service Standards 4-30 Web Service Architecture 4-31 Service Artifacts 4-33 XML Schema Definitions 4-34 Defining Messages in XML Schemas 4-35 Web Services Description Language 4-36 WSDL Model 4-37 Defining Service Interfaces in WSDL 4-38 Quiz 4-39 Adapter Services 4-40 Describing Technology Adapters 4-41 v Packaged Application and Legacy Adapters 4-42 Quiz 4-43 Summary 4-44 Practice 4: Overview Designing Services for SOA Implementations 4-45 Creating a Composite Application Course Roadmap 5-2 Objectives 5-3 Service Component Architecture 5-4 Components and Composites 5-6 SCA Components 5-7 SCA Composite 5-8 SCA Bindings 5-9 SCA Policy Framework 5-10 Quiz 5-11 Service Data Objects (SDO) 5-12 SDO Data Architecture 5-13 SCA and SDO 5-14 Creating an SOA Composite in JDeveloper 11g 5-15 Describing the SOA Composite Editor 5-16 Creating Exposed Services 5-18 Creating SOA Components 5-19 Examining the SCA Descriptor 5-20 Quiz 5-21 Adding a Mediator Component 5-22 Adding a BPEL Process Component 5-23 Comparing BPEL and Mediator 5-24 Examining the JDeveloper Workspace, Projects, and File Structure 5-25 Editing a Component in a Composite 5-26 Creating External References 5-27 Creating Wires 5-28 Creating Wires Modifies Connected Elements 5-29 Exposing Components as an External Service 5-30 Quiz 5-31 Deploying an SOA Composite Application 5-32 Summary 5-33 Practice 5: Overview Creating an SOA Composite Application 5-34 Managing and Monitoring SOA Composite Applications Course Roadmap 6-2 Objectives 6-3 Overview of Managing SOA Applications 6-4 Managing with Oracle Enterprise Manager 6-5 Oracle Enterprise Manager Fusion Middleware Control 6-6 Accessing the SOA Infrastructure Home Page 6-7 Accessing a Composite Application Home Page 6-8 Example Composite Application Home Page 6-9 Deploying a Composite Application 6-10 Deploying SOA Composite Applications 6-11 Initiating an SOA Composite Application Test Instance 6-12 Tracking Message Flow 6-13 vi Working with the Flow Trace 6-14 Working with the Component Audit Trail Page 6-15 Quiz 6-16 Managing the State of Deployed SOA Composite Applications 6-17 Monitoring and Deleting Specific SOA Composite Application Instances 6-18 Recovering from SOA Composite Application Faults 6-19 Undeploying a Composite Application 6-21 Quiz 6-22 Summary 6-23 Practice 6: Overview Managing and Monitoring Composite Applications 6-24 Working with Mediator Components Course Roadmap 7-2 Objectives 7-3 Introducing Oracle Mediator 7-4 Oracle Enterprise Service Bus and Mediator 7-5 Oracle Mediator Features 7-6 Event Delivery Network 7-7 Introducing Business Events 7-8 Event Handling 7-10 Content-Based and Header-Based Routing 7-11 Synchronous/Asynchronous Interactions 7-12 Service Virtualization 7-13 Validations 7-14 Error Handling 7-15 Transformations 7-16 Quiz 7-17 Creating an Oracle Mediator Component 7-18 Mediator Component Creation Options 7-19 Define Interface Later 7-20 Viewing the Mediator Source Code 7-22 Modifying a Mediator Component 7-23 Deleting a Mediator Component 7-24 Specifying Mediator Component Routing Rules 7-25 Introducing Routing Rules 7-26 Accessing Mediator Routing Rules 7-28 Defining Mediator Routing Rules 7-29 Specifying a Target Service: Example 7-31 Adding a Transformation to a Mediator Component 7-32 Filtering Messages 7-33 Specifying Sequential or Parallel Execution 7-35 Quiz 7-36 When to Use Business Events? When to Invoke a Service? 7-37 Summary 7-38 Practice 7: Overview Creating a Mediator Service Component 7-39 vii Orchestrating Services with a BPEL Component Course Roadmap 8-2 Objectives 8-3 Process Orchestration Concepts 8-4 Introducing Business Process Execution Language (BPEL) 8-5 Creating a BPEL Process 8-7 Oracle BPEL Process Designer 8-8 Designing the BPEL Process 8-9 Quiz 8-10 Developing a BPEL Process 8-11 BPEL Activity Types 8-12 Grouping Activities by Using a BPEL Scope 8-14 Adding Activities to a Scope 8-15 Communicating Data with a BPEL Process 8-16 BPEL Variables 8-17 Choosing Global or Local Variables 8-19 The Assign Activity 8-21 Creating Assign Operations 8-22 Copying Data from Source to Target 8-23 Using the XPath Expression Builder 8-24 Quiz 8-25 Partner Links and Service Invocation 8-26 Partner Links, Partner Link Types, and Roles 8-27 Synchronous Services 8-28 Synchronous Process Structure: HelloWorld Example 8-29 Asynchronous Service 8-30 Asynchronous BPEL Process Structure 8-31 Creating a Partner Link 8-32 Configuring a Partner Link 8-33 Invoking a Synchronous Service 8-34 Conditionally Branching with a Switch Activity 8-35 Adding a Switch Activity 8-36 Configuring Branches of a Switch Activity 8-37 Summary 8-38 Practice 8: Overview Creating a BPEL Service Component 8-39 Working with the Human Task Component Course Roadmap 9-2 Objectives 9-3 What Is a Human Task? 9-4 Human Workflow Diagram 9-5 Introduction to Human Workflow Concepts 9-7 Implementing Human Workflow Services 9-8 Exploring Workflow Exchange Patterns 9-9 Describing a Workflow as a Service 9-10 Quiz 9-11 Adding a Human Task Component to an SOA Composite 9-12 The Human Task Editor 9-13 Working with Human Workflow in BPEL 9-14 Creating a Human Task in BPEL 9-15 Configuring the Human Task 9-16 viii Adding Task Parameters 9-17 Setting the Task Parameter Values 9-18 Generating a Task Form for the Worklist 9-19 Accessing the Worklist Application 9-20 Viewing Task Information 9-21 Managing Task Assignments 9-22 Summary 9-23 Practice 9: Overview Creating a Human Task to Approve Orders 9-24 10 Implementing a Business Rules Component Course Roadmap 10-2 Objectives 10-3 Introducing Business Rules Technology 10-4 Declarative Rule Concepts 10-5 Rule Inference Concepts 10-6 Reasons for Using Rules Technology 10-7 Guidelines for Selecting Rules Use Cases 10-8 Introducing Oracle Business Rules 10-9 Introducing Oracle Business Rules Concepts 10-11 Developing a Rule-Enabled Application 10-12 Defining Oracle Business Rules Development Concepts 10-13 Quiz 10-14 Creating a Dictionary for Rule Definitions 10-15 Working with the Rules Editor in JDeveloper 10-16 Creating XMLFact Entries 10-18 Working with Bucketsets 10-19 Creating a Bucketset 10-20 Creating Oracle Business Rules Globals 10-21 Creating a Ruleset 10-22 Identifying the Structure of a Rule 10-23 Creating a Rule 10-24 Creating a Rule Test 10-25 Creating a Rule Action 10-26 Working with Decision Tables 10-27 Creating Conditions and Rules in Decision Tables 10-29 Creating Actions in Decision Tables 10-31 Working with Decision Functions 10-33 Integrating Rules with a BPEL Process 10-34 Adding a Business Rule Activity 10-35 Summary 10-38 Practice 10: Overview Implementing a Business Rule 10-39 11 Securing Services and Composite Applications Course Roadmap 11-2 Objectives 11-3 Introduction to Web Services Security 11-4 Need for Web Services Security 11-5 Web Services Security Approaches 11-6 WS-Security 11-8 WS-Security Fundamentals 11-9 Quiz 11-11 ix Oracle Web Service Manager 11-12 Components of Oracle Web Services Manager Architecture 11-13 Oracle Web Services Manager Policy Framework 11-14 Introduction to Policies 11-15 Policy Interceptor Pipeline 11-16 Policy Assertions 11-17 Quiz 11-18 Managing SOA Composite Application Policies 11-19 Attaching Security Policy to a Service 11-20 Quiz 11-21 Summary 11-22 Practice 11 Overview: Attaching Policies to Web Services 11-23 Appendix A: Practices and Solutions Appendix B: Introduction to Linux What Is Linux? B-2 What Is Oracle’s Strategy for Linux? B-3 File System and Basic Directory Structure B-4 Shell Commands B-6 Environment-Based Commands B-7 Information-Based Commands B-9 File System Commands B-11 Common vi Editing Commands B-13 Common FTP Communication Commands B-15 Archive Utilities B-17 Shortcuts and Tips B-19 Appendix C: Perform Common Tasks with Oracle JDeveloper Objectives C-2 Create a Database Connection C-3 Create an Application Server Connection C-4 Create an Application C-6 Create an Empty Project C-8 Create an SOA Project C-9 Create a Project from Existing Sources C-10 Deploy an SOA Composite Application C-13 Summary C-15 Appendix D: SOA Adoption Planning Principles Objectives D-2 SOA Adoption D-3 SOA Adoption Planning Activities D-4 SOA Adoption Planning Activities: Completing the Stakeholder Community D-5 SOA Adoption Planning Activities: Moving Through the Change Curve D-6 SOA Adoption Planning Activities: Establishing "Line-of-Sight" Goals D-7 SOA Adoption Planning Activities: Establish a Milestone Delivery Plan D-8 SOA Adoption Planning Activities: Usage of Metrics D-9 SOA Adoption Planning Activities: Enabling Business Innovation D-10 SOA Adoption Planning Activities: Usage of Tools and Processes D-11 The Need for an SOA Reference Architecture D-12 x WS-Security Fundamentals (continued) • Confidentiality: It specifies that the data must be revealed to only those applications for whom it is meant It ensures data privacy by encrypting data between endpoints Oracle Application Server Web Services incorporates data confidentiality by implementing the following: - W3C XML encryption standard: The W3C XML encryption specification describes a process for encrypting data and representing the result in XML The data can be an XML document, an XML element, or the content of an XML element The data also contains information that enables an intended recipient to decrypt the data The result of encrypting data is an XML encryption element that contains the encrypted data The standard allows only selected parts of an XML document to be encrypted and not the entire document - Standard key exchange mechanisms: The data can be encrypted and decrypted by using some secret information, referred to as a key There are two types of encryption techniques: symmetric encryption and asymmetric encryption In case of symmetric encryption, one particular key is used for both encryption and decryption of data In the asymmetric encryption technique, each user has a public key and a private key The encryption of data is performed with the public key and the decryption is done with the private key or vice versa • Integrity: It specifies whether the message is lost, destroyed, or modified in transit, either accidentally or intentionally Oracle Application Server Web Services implements integrity by incorporating the W3C XML signature standard The XML signature specification describes digital signature processing rules and syntax to provide message integrity, message authentication, and signer authentication services for data of any type, whether located in the XML that includes the signature or elsewhere An XML signature contains the basic hash (message digest) of the signed document It also contains information about what data was signed and which algorithms were used An XML signature can be included within the document to which the signature belongs or in a separate document An XML signature can also be applied to specific parts of a document and not the entire document as a whole Oracle SOA Suite 11g: Essential Concepts 11 - 10 Quiz Authentication can be incorporated using _ Signature Security tokens Encryption Copyright © 2009, Oracle All rights reserved Answer: Explanation : Authentication is the process of obtaining a username and password that is validated by using some kind of identity store For example, you may want to verify the origin of a document, the identity of the sender, and the time and date when a document was sent or signed Authentication is incorporated by using security tokens The security tokens supported are: • Username token: The username token carries basic authentication information It propagates username and password information to authenticate the message • X.509 certificates: The X.509 is a standard for defining digital certificates An X.509 certificate specifies a binding between a public key and a set of attributes that includes subject name, issuer name, serial number, and validity interval X.509 certificate may be used to validate a public key that may be used to sign or encrypt a SOAP message • SAML assertions: SAML security tokens are composed of assertions that are used to exchange security information, including attribute statements, authentication decision statements, and authorization decision statements SAML tokens are attached to SOAP messages by placing assertion elements inside the header Oracle SOA Suite 11g: Essential Concepts 11 - 11 Oracle Web Service Manager • • Oracle Web Service Manager (OWSM) is security and management system that provides a common security infrastructure for Web services applications The Oracle Web Service Manager (OWSM) is based on three main operations: – Define – Enforce – Monitor Copyright © 2009, Oracle All rights reserved Oracle Web Service Manager The Oracle Web Services Manager is designed to define and implement Web services security in heterogeneous environment Instead of coding security logic in the application, you can use Oracle Web Services Manager to implement declarative security and management through predefined policies The three main operations on which the Oracle Web Services manager is based are: • Define consists in attaching security and management policies to the Web services to be protected • Enforce is the ability provided by Oracle Web Services Manager to distribute policies from a central policy manager to policy enforcement points that execute security and management policies at run time • Monitor is the tracking of run-time security and management events captured by the Oracle Web Services Manager Oracle SOA Suite 11g: Essential Concepts 11 - 12 Components of Oracle Web Services Manager Architecture Oracle WSM Agent Reliable Messaging Management Addressing Security MTOM Policy Interceptors Oracle Enterprise Manager Fusion Middleware Control Oracle JDeveloper Oracle WSM Policy Manager Metadata Store (MDS) Oracle Fusion Middleware Database Copyright © 2009, Oracle All rights reserved Components of Oracle Web Services Manager Architecture The components of the Oracle Web Services Manager Architecture can be described as follows: • Oracle Enterprise Manager Fusion Middleware Control: Enables administrators to access Oracle Web Services Manager’s functionality to manage, secure, and monitor Web services • Oracle Web Services Manager Policy Manager: Reads and writes policies, including predefined and custom policies from the metadata store • Oracle WSM Agent: Manages the enforcement of policies via the Policy Interceptor Pipeline • Policy Interceptors: Enforce policies, including reliable messaging, management, addressing, security, and Message Transmission Optimization Mechanism (MTOM) • Metadata Store: Used for storing policies Policies can be stored either as files in the file system (supported for development) or to the Oracle Fusion Middleware database (supported for production) • Oracle Fusion Middleware Database: Provides database support for the MDS Oracle SOA Suite 11g: Essential Concepts 11 - 13 Oracle Web Services Manager Policy Framework • • Oracle Web Service Manager provides a policy framework to manage and secure Web services consistently The policy framework is build using the WS-Policy standard and leverages the Oracle Platform Security Service (OPSS) Login Module and Oracle WebLogic Server authenticator for authentication and authorization Oracle Web Services Manager Policy Enforcement Point Oracle Platform Security Login Module Oracle WebLogic Server Authenticator Copyright © 2009, Oracle All rights reserved Oracle Web Services Manager Policy Framework Oracle OWSM can be leveraged from the Oracle Enterprise Manager Fusion Middleware Control to: • Centrally define policies using the Oracle WSM Policy Manager • Enforce Oracle WSM security and management polices locally at run time You can perform the following tasks from Oracle Enterprise Manager Fusion Middleware Control: • Handle WS-Security (for example, encryption, decryption, signing, signature validation, and so on) • Define authentication and authorization policies against an LDAP directory • Generate standard security tokens (such as SAML tokens) to propagate identities across multiple Web services used in a single transaction • Segment policies into different namespaces by creating policies within different folders • Examine log files Oracle SOA Suite 11g: Essential Concepts 11 - 14 Introduction to Policies Policies describe the capabilities and requirements of a Web service The different types of policies supported in Oracle Fusion Middleware 11g are: • WS-ReliableMessaging • Management • WS-Addressing • Security • Message Transmission Optimization Mechanism (MTOM) Copyright © 2009, Oracle All rights reserved Introduction to Policies The different type of policies available are as follows: • WS-ReliableMessaging: Reliable messaging policies that implement the WSReliableMessaging standard describes a wire-level protocol that allows guaranteed delivery of SOAP messages, and can maintain the order of sequence in which a set of messages are delivered • Management: Management policies that log request, response, and fault messages to a message log Management policies may include custom policies • WS-Addressing: WS-Addressing policies that verify that SOAP messages include WSAddressing headers in conformance with the WS-Addressing specification Transport-level data is included in the XML message rather than relying on the network-level transport to convey this information • Security: Security policies that implement the WS-Security 1.0 and 1.1 standards They enforce message protection (message integrity and message confidentiality), and authentication and authorization of Web service requesters and providers The following token profiles are supported: username token, X.509 certificate, Kerberos ticket, and Security Assertion Markup Language (SAML) assertion • Message Transmission Optimization Mechanism: Binary content, such as an image in JPEG format, can be passed between the client and the Web service In order to be passed, the binary content is typically inserted into an XML document Oracle SOA Suite 11g: Essential Concepts 11 - 15 Policy Interceptor Pipeline Request Reliable Messaging Management Addressing Security MTOM Response Client Network MTOM Security Addressing Management Reliable Messaging Web Service Copyright © 2009, Oracle All rights reserved Policy Interceptor Pipeline The slide depicts Policy Interceptors acting on messages between a client and Web service The messaging order can be described as follows: • The client sends a request message to a Web service • The policy interceptors intercept and execute the policies attached to the client After the client policies are successfully executed, the request message is sent to the Web service • The request message is intercepted by policy interceptors, which then execute any service policies that are attached to the Web service • After the service policies are successfully executed, the request message is passed to the Web service The Web service executes the request message and returns a response message • The response message is intercepted by the policy interceptors, which execute the service policies attached to the Web service After the service policies are successfully executed, the response message is sent to the client • The response message is intercepted by the policy interceptors, which execute any client policies attached to the client • After the client policies are successfully executed, the response message is passed to the client Oracle SOA Suite 11g: Essential Concepts 11 - 16 Policy Assertions • • Oracle Web Services Manager policies are made of one or more assertions that exhibit a particular behavior Assertions are executed in the order in which they are listed in the policy Policy Request Response Assertion Assertion Assertion n Copyright © 2009, Oracle All rights reserved Policy Assertions Oracle Web Services Manager policies consists of one or more assertions exhibiting a particular capability/behavior For example, a security policy could be made up of two assertions a) Log assertion b) WS-Security assertion If this particular security policy is attached, the log assertion gets executed first, resulting in the request message being logged into a log file This is followed by the execution of the WS-Security assertion that authenticates the requestor and decrypts the message if it is encrypted Oracle WSM policy assertions are instances of policy assertion templates that are added to a policy at policy creation time There are a set of predefined policy assertion templates that come as a part of Oracle Web Services Manager Oracle WSM allows users to define custom policy assertions that can be executed in a policy along with predefined policy assertions Custom policy assertions are used when specific functionality is not provided Oracle SOA Suite 11g: Essential Concepts 11 - 17 Quiz Policies are made up of one or more _ Tokens Protocols Assertions Copyright © 2009, Oracle All rights reserved Answer: Explanation : Oracle Web Services Manager policies are made of one or more assertions that exhibit a particular behavior Assertions are executed in the order in which they are listed in the policy Oracle WSM policy assertions are instances of policy assertion templates that are added to a policy at policy creation time There are a set of predefined policy assertion templates that come as a part of Oracle Web Services Manager Oracle SOA Suite 11g: Essential Concepts 11 - 18 Managing SOA Composite Application Policies Policies page Specifying the component to which the policy is to be attached Copyright © 2009, Oracle All rights reserved Managing SOA Composite Application Policies Policies apply security to the delivery of messages You can attach or detach security policies to and from currently deployed SOA composite applications To manage SOA composite application policies: Select “soa-infra” in the SOA folder Select a specific SOA composite application Click the Policies tab The Policies page enables you to attach and detach policies to Web service binding components and service components of the SOA composite application The policies table displays the attached policy name, component to which the policy is attached, policy reference status (enabled or disabled) that you can toggle, category (Management, Reliable Messaging, MTOM Attachment, Security, or WS Addressing), violations, and authentication, authorization, confidentiality, and integrity failures since the SOA Infrastructure was last restarted Click Attach To/Detach From Select the component to which to attach or detach a policy This invokes a dialog for attaching or detaching policies Oracle SOA Suite 11g: Essential Concepts 11 - 19 Attaching Security Policy to a Service Attaching the policy Executing the Validation test Copyright © 2009, Oracle All rights reserved Managing SOA Composite Application Policies (continued) Select policies to attach that are appropriate to your environment Click Attach Attach additional policies as needed When you are finished attaching policies, click Validate 10 If an error message appears, make the necessary corrections until you no longer have any validation errors 11 Click OK Oracle SOA Suite 11g: Essential Concepts 11 - 20 Quiz Policies apply security to the delivery of messages True False Copyright © 2009, Oracle All rights reserved Answer: Explanation: Oracle Web Services Manager provides two tools for attaching policies to clients and services – Oracle JDeveloper and Oracle Enterprise Manager Application developers can attach Oracle Web Services Manager policies at application design time within JDeveloper Whether to attach policies within JDeveloper or Oracle Enterprise Manager is based on whether you want to empower application developers to apply policies and lock down the application or you want application developers to concentrate on writing business logic while security administrator applies policies post-deployment of the application Oracle SOA Suite 11g: Essential Concepts 11 - 21 Summary In this lesson you should have learned how to: • Describe Web services security • Identify the need for security for services • Understand the Oracle Web Service Manager • Describe the components of the Oracle Web Service Manager architecture • Attach security policies to services Copyright © 2009, Oracle All rights reserved Summary This lesson introduced the need of securing services, the components of the Oracle Web Service Manager Architecture, and how to use the Enterprise Manager console to attach security policies Oracle SOA Suite 11g: Essential Concepts 11 - 22 Practice 11 Overview: Attaching Policies to Web Services This practice covers the following topics: • Attach username_security_policy to the receivePO Web service (entry point in Enterprise Manager) • Attach log_policy to receivePO Web service • Test in Enterprise Manager Copyright © 2009, Oracle All rights reserved Oracle SOA Suite 11g: Essential Concepts 11 - 23 [...]... the SOA Reference Architecture D -1 3 Developing the SOA Reference Architecture: Align IT with Business D -1 4 Developing the SOA Reference Architecture: Develop a Baseline D -1 5 Developing the SOA Reference Architecture: Create SOA Reference Architecture D -1 6 Developing the SOA Reference Architecture: Create SOA Infrastructure Roadmap D -1 7 SOA Governance Model D -1 8 Example of an SOA Governance Model D -1 9 ... implemented using an SOA approach for managing the business process Oracle SOA Suite 11 g: Essential Concepts I - 2 Course Agenda: Day 1 A O S Service-Oriented Architecture Concepts Implementing SOA with Oracle SOA Suite SOA Governance and Service Life-Cycle Management 1 2 3 Designing Services for SOA Implementations 4 Copyright © 2009, Oracle All rights reserved Course Agenda: Day 1 The following is... © 2009, Oracle All rights reserved Oracle SOA Suite 11 g: Essential Concepts I - 6 Service-Oriented Architecture Concepts Copyright © 2009, Oracle All rights reserved Course Road Map In this “Service-Oriented Architecture Concepts lesson you will be introduced to Service-Oriented Architecture (SOA) concepts, the standards that enable SOA, and the different drivers that help you devise an SOA strategy... enable SOA • Identify basic design requirements for an SOA approach • Explain the role of SOA governance Copyright © 2009, Oracle All rights reserved Oracle SOA Suite 11 g: Essential Concepts 1 - 3 Definition: Service-Oriented Architecture (SOA) Service-Oriented Architecture is an IT strategy that organizes the discrete functions contained in enterprise applications into interoperable, standards-based... business processes Oracle SOA Suite 11 g: Essential Concepts 1 - 4 Why SOA? SOA enables: • Reusability – Business services • Interoperability – Loosely coupled services • Scalability and flexibility – Coarse-grained – Document-oriented – Asynchronous services • Cost efficiency – Standards-based approach Copyright © 2009, Oracle All rights reserved Why SOA? What drives the move to SOA is reuse of business... platform and are standards-enabled The services are also not tightly coupled to the application • Scalability: Applications are flexible to the changing business requirements • Cost efficiency: Highly cost efficient as integrating the business resources is standards-based Oracle SOA Suite 11 g: Essential Concepts 1 - 11 SOA Further Defined • SOA can be thought of as: – An enterprise-level design approach... day 1: • Introduction to the course and lessons • Lesson 1: Service-Oriented Architecture Concepts: This lesson discusses the system integration challenges and problems faced by enterprises, and explores what needs to be considered before embarking on an SOA style implementation • Lesson 2: Implementing SOA with Oracle SOA Suite: This lesson describes Oracle SOA Suite 11 g products and components Oracle. .. introduction to Oracle Business Rules and its implementation in the SOA composite application, by using a business rules service component • Lesson 11 : Securing Services and Composite Applications: The aim of this lesson is to introduce the basic security concepts and Oracle Web Services Manager security feature in securing an SOA composite application Oracle SOA Suite 11 g: Essential Concepts I - 5 Summary... provides the user interface–related services The service-centric integration approach provides a shared service and infrastructure platform that encourages reusability and flexibility Oracle SOA Suite 11 g: Essential Concepts 1 - 13 SOA: A Paradigm Shift Distributed Component Architecture Service-Oriented Architecture Functionality-oriented Process-oriented Designed to last Designed to change Long development... and the service usage guidelines of service consumers Oracle SOA Suite 11 g: Essential Concepts 1 - 15 The Eight-Domain Model Approach for SOA (continued) Operations, Administration, and Management: Contains capabilities concerning the post deployment aspects of solutions based on a Service-Oriented Architecture, such as the operations, administration, and management aspects of SOA Organization: Contains
- Xem thêm -

Xem thêm: Student Guide - Oracle SOA Suite 11g Essential Concepts Volume 1, Student Guide - Oracle SOA Suite 11g Essential Concepts Volume 1, Student Guide - Oracle SOA Suite 11g Essential Concepts Volume 1

Mục lục

Xem thêm

Gợi ý tài liệu liên quan cho bạn

Nạp tiền Tải lên
Đăng ký
Đăng nhập