ACORD Web Services Profile: 2.0 vs. 1.0

Size: px
Start display at page:

Download "ACORD Web Services Profile: 2.0 vs. 1.0"

Transcription

1 ACORD Web Services Profile: 2.0 vs. 1.0 Kevin Schipani, Serge Cayron ACORD ACORD 2009

2 Agenda Introduction ti to AWSP 2.0 Members views - Requirements and Use Cases Conclusion

3 Background AWSP 1 for initial deployment (SOAP 1.1 generation) AWSP 1.0 standard release : January 2008 AWSP 1.1 standard release : May 2008 AWSP 2 - for deployment with target t WS standard versions (SOAP 1.2 generation) Working Group restarted in July 2009

4 AWSP goals To provide guidance for Service Oriented implementation of ACORD standards Developing a Profile for usage of Web Services Standards d will help ACORD members by lowering the number of unique party-to-party solutions. by providing interoperability rules and reduction of number of options for compatibility and cheaper implementation. by building a roadmap for incremental adoption of Web Services Standards

5 AWSP key topics How do I define Web Service interfaces for ACORD Standards? Basic SOAP and WSDL Profile Business Message Exchange Patterns and their WS implementation Basic transmission reliability Guidance on WSDL interface design How do I solve end-to-end addressing problems? Addressing Profile Go through messaging intermediaries Enable asynchronous responses Route to fine grain services.

6 AWSP key topics How do I secure message flows and service access? Security Profile Signature and encryption Identity communication How do I establish advanced Reliable and Secure sessions? Reliable Secure Profile (for future versions)

7 AWSP key topics How do I report errors at service infrastructure t level? l? SOAP Fault Profile How do I deal with attachments? t Attachment Handling Profile In-band communication Out-of-band communication How do I deal with batches? Message Groups and Batches Profile

8 What s new in AWSP 2 Seamless transport and security protection of in-band binary attachments Attachments are included as base64 encoded elements and automatically transformed into MIME parts for transport (MTOM standard). More flexibly specify service operations. Service operations can be defined for specific transactions, using WS-Addressing, and response endpoints can be controlled.

9 Policy Placement: Quotation

10 Service Granularity options for AML Fine Grain (with WS-Addressing) The ports and operations combine transaction types and line of business types e.g. ProfessionalIndemnityPolicyNewBusiness Coarse Grain (without WS-Addressing) The ports and operations map to transaction types e.g. PolicyNewBusiness

11 Policy New Business New Business Process Result Service Quotation client Order client PolicyNewBusinessQuotationProcess Acknowledgement PolicyNewBusinessOrderProcess Acknowledgement New Business Process Service Quotation Service Order Service Quotation Result Service Order Result Service PolicyNewBusinessQuotationProcessResult Acknowledgement PolicyNewBusinessQuotationProcessResult Acknowledgement Quotation Result client Order Result client

12 What s new in AWSP 2 Stronger standardization of WSDL interfaces for off-the-shelf h interoperability Messages (ACORD) Import Port Types (ACORD) Import Ports and Services (Company)

13 What s new in AWSP 2 Robust support of Messaging Intermediaries SOAP 1.2 header discriminates control information intended for intermediaries or endpoints. WS-Addressing conveys endpoint addresses through all nodes in the end to end flow. WS-Security protects information intended to endpoints or intermediaries. Security Profile enhancements Security Profile integrated Security features driven by use cases Added support for SAML - Identity assertion in support of fine grained Access Control rules.

14 Requirements met by AWSP 2 Jim Brain - Aegon

15 Attachment Processing Insurance business processes commonly require image or related data in addition to XML business data Real time processing demands in-band attachment handling Data is commonly binary format. File can be non trivial in size

16 AWSP 1.X Attachment Handling SOAP 1.1 uses Base64Binary inline attachments The data is contained in the SOAP Information Set (InfoSet), but Utilizes only 64 ASCII characters to represent binary data each h3b bytes of fdata become 4 characters Therefore, by definition, each file is increased by 33%. Thus, a 3MB image becomes 4MB under SOAP 1.1.

17 SOAP with Attachments SOAP with Attachments (SwA) attempted to overcome the 33% concern: Binary data could be sent as MIME attachment Reference to MIME attachment was stored in XML InfoSet But, the data was no longer part of the XML message, it was outside the message

18 AWSP 1.X message

19 AWSP 2.0 MTOM Attachments Message Transmission Optimization Mechanism MTOM provides best of both worlds: Attachments are sent as binary data, just like in SwA (In fact, MTOM messages are backwards compatible) XML InfoSet includes binary data. Thus, MTOM allows the XML and binary data to be treated as one unit, even though it is sent separately over the network.

20 MTOM Example <?xml version='1.0' encoding='utf-8'?> <soapenv:envelope xmlns:soapenv="..."...> "... <xop:include xmlns:xop=" </xop:include>... </soapenv:envelope> --MIMEBoundary4A7AE55984E content-type: type: application/octet-stream content-transfer-encoding: binary content-id: Binary Data... --MIMEBoundary4A7AE55984E

21 Addressing and Routing Options AWSP 1.X relies on SOAP routing and addressing mechanisms for correct operation SOAP URL and Action: HTTP header specifies endpoint information Errors and Replies can only be sent to original sender Client can provide limited information about itself

22 WS-Addressing WS-Addressing provides richer routing options for the ACORD implementer Source can be identified with more (and more consistent) detail. As noted previously, service granularity is enhanced. Replies and Fault information can be directed d to other endpoints Services can redirect clients to alternative endpoints on subsequent calls. Routing is independent of transfer technology.

23 Security Considerations In today s regulatory environment, information security is critical: SSL/TLS data security is often not enough True end-to-end security must be ensured Services must authenticate and authorize clients Support for complex security constructs like tokens, tickets, and certificates must be supported

24 WS-Security Security Advantages WS-Security Security creates consistency in service protection Open framework allows multiple security methodologies to be implemented Standard addresses industry security requirements more completely Allows easier security integration

25 A Plug an Play approach KiNam Kim, Kevin Kosienski Mass Mutual

26 Delivery Plan December 2009: AWSP 2.0 draft with Basic Profile, Addressing Profile, Fault handling and Attachment handling February 2010: AWSP 2.0 draft with Security Profile, including SAML April 2010: AWSP 2.0 Candidate Recommendation.

27 Going Forward AWSP 2 intention is to become the master for specific implementation guides AWSP 2 approach: tool box with guidance based on use cases. Your Use Cases are needed for AWSP validation and enrichment!

28

29 Two Blue Hill Plaza 3 rd Floor Pearl River, NY USA London Underwriting Centre Suite 1/3 3 Minster Court Mincing Lane London EC3R 7DD United Kingdom +44 (0)

SOAP 1.2, MTOM and their applications

SOAP 1.2, MTOM and their applications SOAP 1.2, MTOM and their applications Hervé Ruellan Canon Research Centre France 1 Agenda SOAP 1.2 XOP, MTOM and Resource Header Canon 2 SOAP 1.2 3 SOAP Background Web success Easy information sharing

More information

Lesson 13 Securing Web Services (WS-Security, SAML)

Lesson 13 Securing Web Services (WS-Security, SAML) Lesson 13 Securing Web Services (WS-Security, SAML) Service Oriented Architectures Module 2 - WS Security Unit 1 Auxiliary Protocols Ernesto Damiani Università di Milano element This element

More information

Enterprise SOA Experience Workshop. Module 8: Operating an enterprise SOA Landscape

Enterprise SOA Experience Workshop. Module 8: Operating an enterprise SOA Landscape Enterprise SOA Experience Workshop Module 8: Operating an enterprise SOA Landscape Agenda 1. Authentication and Authorization 2. Web Services and Security 3. Web Services and Change Management 4. Summary

More information

1Z Java EE 6 Web Services Developer Certified Expert Exam Summary Syllabus Questions

1Z Java EE 6 Web Services Developer Certified Expert Exam Summary Syllabus Questions 1Z0-897 Java EE 6 Web Services Developer Certified Expert Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-897 Exam on Java EE 6 Web Services Developer Certified Expert... 2 Oracle

More information

C exam. IBM C IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile. Version: 1.

C exam.   IBM C IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile. Version: 1. C9510-319.exam Number: C9510-319 Passing Score: 800 Time Limit: 120 min File Version: 1.0 IBM C9510-319 IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile Version: 1.0 Exam A QUESTION

More information

Basic Profile 1.0. Promoting Web Services Interoperability Across Platforms, Applications and Programming Languages

Basic Profile 1.0. Promoting Web Services Interoperability Across Platforms, Applications and Programming Languages Promoting Web Services Interoperability Across Platforms, Applications and Programming Languages Basic Profile 1.0 August 12, 2003 WS-I GOALS Achieve interoperability Integrate specifications Promote consistent

More information

Proof of concept AS4. Version 1 Revision ITC-KG AS4 Proof of Concept 16 January 2014 Draft INT

Proof of concept AS4. Version 1 Revision ITC-KG AS4 Proof of Concept 16 January 2014 Draft INT ITC-KG AS4 Proof of Concept 16 January 2014 Draft Proof of concept AS4 Version 1 Revision 02 2014-01-08 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894 5101; info@entsog.eu,

More information

Service Interface Design RSVZ / INASTI 12 July 2006

Service Interface Design RSVZ / INASTI 12 July 2006 Architectural Guidelines Service Interface Design RSVZ / INASTI 12 July 2006 Agenda > Mandatory standards > Web Service Styles and Usages > Service interface design > Service versioning > Securing Web

More information

WS-*/REST Web Services with WSO2 WSF/PHP. Samisa Abeysinghe Nandika Jayawardana

WS-*/REST Web Services with WSO2 WSF/PHP. Samisa Abeysinghe Nandika Jayawardana WS-*/REST Web Services with WSO2 WSF/PHP Samisa Abeysinghe Nandika Jayawardana Zend PHP Conference & Expo, San Jose, 30 Oct 2006 About Us Samisa Member ASF Lead contributor Apache Axis2/C Was an active

More information

Lesson 3 SOAP message structure

Lesson 3 SOAP message structure Lesson 3 SOAP message structure Service Oriented Architectures Security Module 1 - Basic technologies Unit 2 SOAP Ernesto Damiani Università di Milano SOAP structure (1) SOAP message = SOAP envelope Envelope

More information

U.S. E-Authentication Interoperability Lab Engineer

U.S. E-Authentication Interoperability Lab Engineer Using Digital Certificates to Establish Federated Trust chris.brown@enspier.com U.S. E-Authentication Interoperability Lab Engineer Agenda U.S. Federal E-Authentication Background Current State of PKI

More information

Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006

Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006 Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006 John Hohwald Slide 1 Definitions and Terminology What is SOA? SOA is an architectural style whose goal is to achieve loose coupling

More information

Oracle Developer Day

Oracle Developer Day Oracle Developer Day Sponsored by: Track # 1: Session #2 Web Services Speaker 1 Agenda Developing Web services Architecture, development and interoperability Quality of service Security, reliability, management

More information

WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices

WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices Chris Steel, Ramesh Nagappan, Ray Lai www.coresecuritypatterns.com February 16, 2005 15:25 16:35

More information

National Identity Exchange Federation. Web Services System- to- System Profile. Version 1.1

National Identity Exchange Federation. Web Services System- to- System Profile. Version 1.1 National Identity Exchange Federation Web Services System- to- System Profile Version 1.1 July 24, 2015 Table of Contents TABLE OF CONTENTS I 1. TARGET AUDIENCE AND PURPOSE 1 2. NIEF IDENTITY TRUST FRAMEWORK

More information

Chapter 17 Web Services Additional Topics

Chapter 17 Web Services Additional Topics Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 17 Web Services Additional Topics Prof. Dr.-Ing. Stefan Deßloch

More information

We are ready to serve Latest Testing Trends, Are you ready to learn? New Batch Details

We are ready to serve Latest Testing Trends, Are you ready to learn? New Batch Details We are ready to serve Latest Testing Trends, Are you ready to learn? START DATE : New Batch Details TIMINGS : DURATION : TYPE OF BATCH : FEE : FACULTY NAME : LAB TIMINGS : SOAP UI, SOA Testing, API Testing,

More information

MSc. Software Engineering. Examinations for / Semester 1

MSc. Software Engineering. Examinations for / Semester 1 MSc. Software Engineering Cohorts: MSE/16B/PT Examinations for 2016 2017/ Semester 1 MODULE: Service Oriented Architecture MODULE CODE: WAT 5101C Duration: 3 Hours Instructions to Candidates: 1. Answer

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Interoperability Guide for Oracle Web Services Manager 11g Release 1 (11.1.1) E16098-04 January 2011 This document describes how to implement the most common Oracle WSM interoperability

More information

Inforce Transactions TECHNICAL REFERENCE. DTCCSOLUTIONS September Copyright 2011 Depository Trust Clearing Corporation. All Rights Reserved.

Inforce Transactions TECHNICAL REFERENCE. DTCCSOLUTIONS September Copyright 2011 Depository Trust Clearing Corporation. All Rights Reserved. TECHNICAL REFERENCE Inforce Transactions Page 1 Table of Contents 1 Overview... 3 2 Roles and Responsibilities... 3 2.1 Participants... 3 2.2 DTCC Server... 4 3 Communication Protocols... 5 3.1 SOAP Messages...

More information

WS-* Standards. Szolgáltatásorientált rendszerintegráció Service-Oriented System Integration. Dr. Balázs Simon BME, IIT

WS-* Standards. Szolgáltatásorientált rendszerintegráció Service-Oriented System Integration. Dr. Balázs Simon BME, IIT WS-* Standards Szolgáltatásorientált rendszerintegráció Service-Oriented System Integration Dr. Balázs Simon BME, IIT Outline Integration requirements WS-* standards 2 Integration requirements 3 Integration

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Interoperability Guide for Oracle Web Services Manager 11g Release 1 (11.1.1) E16098-01 October 2009 This document describes how to implement the most common Oracle WSM interoperability

More information

Distributed Systems. Web Services (WS) and Service Oriented Architectures (SOA) László Böszörményi Distributed Systems Web Services - 1

Distributed Systems. Web Services (WS) and Service Oriented Architectures (SOA) László Böszörményi Distributed Systems Web Services - 1 Distributed Systems Web Services (WS) and Service Oriented Architectures (SOA) László Böszörményi Distributed Systems Web Services - 1 Service Oriented Architectures (SOA) A SOA defines, how services are

More information

DEVELOPER GUIDE PART B CONNECTOR REQUIREMENTS

DEVELOPER GUIDE PART B CONNECTOR REQUIREMENTS DEVELOPER GUIDE PART B CONNECTOR REQUIREMENTS Warning: This is a redacted version of the SIDES Developer Guide and is NOT the latest version. For development, log into the Members Site and obtain the latest

More information

Programming Web Services in Java

Programming Web Services in Java Programming Web Services in Java Description Audience This course teaches students how to program Web Services in Java, including using SOAP, WSDL and UDDI. Developers and other people interested in learning

More information

Lesson 15 SOA with REST (Part II)

Lesson 15 SOA with REST (Part II) Lesson 15 SOA with REST (Part II) Service Oriented Architectures Security Module 3 - Resource-oriented services Unit 1 REST Ernesto Damiani Università di Milano REST Design Tips 1. Understanding GET vs.

More information

RealMe. SAML v2.0 Messaging Introduction. Richard Bergquist Datacom Systems (Wellington) Ltd. Date: 15 November 2012

RealMe. SAML v2.0 Messaging Introduction. Richard Bergquist Datacom Systems (Wellington) Ltd. Date: 15 November 2012 RealMe Version: Author: 1.0 APPROVED Richard Bergquist Datacom Systems (Wellington) Ltd Date: 15 November 2012 CROWN COPYRIGHT This work is licensed under the Creative Commons Attribution 3.0 New Zealand

More information

Goal: Offer practical information to help the architecture evaluation of an SOA system. Evaluating a Service-Oriented Architecture

Goal: Offer practical information to help the architecture evaluation of an SOA system. Evaluating a Service-Oriented Architecture Evaluating a Service-Oriented Architecture Paulo Merson, SEI with Phil Bianco, SEI Rick Kotermanski, Summa Technologies May 2007 Goal: Offer practical information to help the architecture evaluation of

More information

Web Services Security. Dr. Ingo Melzer, Prof. Mario Jeckle

Web Services Security. Dr. Ingo Melzer, Prof. Mario Jeckle Web Services Security Dr. Ingo Melzer, Prof. Mario Jeckle What is a Web Service? Infrastructure Web Service I. Melzer -- Web Services Security 2 What is a Web Service? Directory Description UDDI/WSIL WSDL

More information

ehealthbox v.2 Consultation Web Service Cookbook Version 2.4

ehealthbox v.2 Consultation Web Service Cookbook Version 2.4 ehealthbox v.2 Consultation Web Service Cookbook Version 2.4 This document is provided to you free of charge by the ehealth platform Willebroekkaai 38 1000 Brussel 38, Quai de Willebroek 1000Bruxelles

More information

COP 4814 Florida International University Kip Irvine. Inside WCF. Updated: 11/21/2013

COP 4814 Florida International University Kip Irvine. Inside WCF. Updated: 11/21/2013 COP 4814 Florida International University Kip Irvine Inside WCF Updated: 11/21/2013 Inside Windows Communication Foundation, by Justin Smith, Microsoft Press, 2007 History and Motivations HTTP and XML

More information

A Signing Proxy for Web Services Security

A Signing Proxy for Web Services Security A Signing Proxy for Web Services Security Dr. Ingo Melzer Prof. Mario Jeckle What is a Web Service? Web Service Directory Description UDDI/WSIL WSDL Transport Content Infrastructure SOAP XML Web Service

More information

IEC : Implementation Profile

IEC : Implementation Profile The Standards Based Integration Company Systems Integration Specialists Company, Inc. IEC 61968 100: Implementation Profile CIM University Prague, Czech Republic May 10, 2011 Margaret Goodrich, Manager,

More information

Web Services in Cincom VisualWorks. WHITE PAPER Cincom In-depth Analysis and Review

Web Services in Cincom VisualWorks. WHITE PAPER Cincom In-depth Analysis and Review Web Services in Cincom VisualWorks WHITE PAPER Cincom In-depth Analysis and Review Web Services in Cincom VisualWorks Table of Contents Web Services in VisualWorks....................... 1 Web Services

More information

Forum XWall and Oracle Application Server 10g

Forum XWall and Oracle Application Server 10g Forum XWall and Oracle Application Server 10g technical white paper Forum Systems, Inc. BOSTON, MA 95 Sawyer Road, suite 110 Waltham, MA 02453 SALT LAKE CITY, UT 45 West 10000 South, suite 415 Sandy, UT

More information

Datapower is both a security appliance & can provide a firewall mechanism to get into Systems of Record

Datapower is both a security appliance & can provide a firewall mechanism to get into Systems of Record 1 2 3 Datapower is both a security appliance & can provide a firewall mechanism to get into Systems of Record 5 White boxes show the access points for different kinds of security. That s what we will

More information

zentrale Sicherheitsplattform für WS Web Services Manager in Action: Leitender Systemberater Kersten Mebus

zentrale Sicherheitsplattform für WS Web Services Manager in Action: Leitender Systemberater Kersten Mebus Web Services Manager in Action: zentrale Sicherheitsplattform für WS Kersten Mebus Leitender Systemberater Agenda Web Services Security Oracle Web Service Manager Samples OWSM vs

More information

Security Assertions Markup Language (SAML)

Security Assertions Markup Language (SAML) Security Assertions Markup Language (SAML) The standard XML framework for secure information exchange Netegrity White Paper PUBLISHED: MAY 20, 2001 Copyright 2001 Netegrity, Inc. All Rights Reserved. Netegrity

More information

Technologies for Securing the Networked Supply Chain. Alex Deacon Advanced Products and Research Group VeriSign, Inc.

Technologies for Securing the Networked Supply Chain. Alex Deacon Advanced Products and Research Group VeriSign, Inc. Technologies for Securing the Networked Supply Chain Alex Deacon Advanced Products and Research Group VeriSign, Inc. Agenda Introduction Security challenges Security technologies in use today Applying

More information

ArcGIS Server and Portal for ArcGIS An Introduction to Security

ArcGIS Server and Portal for ArcGIS An Introduction to Security ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context

More information

XML Web Service? A programmable component Provides a particular function for an application Can be published, located, and invoked across the Web

XML Web Service? A programmable component Provides a particular function for an application Can be published, located, and invoked across the Web Web Services. XML Web Service? A programmable component Provides a particular function for an application Can be published, located, and invoked across the Web Platform: Windows COM Component Previously

More information

Web Services Security SOAP Messages with Attachments (SwA) Profile 1.0 Interop 1 Scenarios

Web Services Security SOAP Messages with Attachments (SwA) Profile 1.0 Interop 1 Scenarios 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Web Services Security SOAP Messages with Attachments (SwA) Profile 1.0 Interop 1 Scenarios Working Draft 04, 21 Oct 2004 Document identifier:

More information

Interoperability Solutions Guide for Oracle Web Services Manager 12c (12.2.1)

Interoperability Solutions Guide for Oracle Web Services Manager 12c (12.2.1) [1]Oracle Fusion Middleware Interoperability Solutions Guide for Oracle Web Services Manager 12c (12.2.1) E57783-01 October 2015 Documentation for software developers that describes how to implement the

More information

AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0

AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 z/tpf V1.1 TPF Users Group - Spring 2009 Security Considerations in a Service Oriented Architecture (SOA) Jason Keenaghan Main Tent AIM Enterprise Platform Software IBM z/transaction Processing Facility

More information

DTCC Web Services Implementation

DTCC Web Services Implementation DTCC Web Services Implementation ACORD Implementation Forum November 4, 2009 Session Agenda DTCC Insurance & Retirement Services Overview ACORD Messages Supported by DTCC Web Services Design and Features

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015 RESEARCH ARTICLE OPEN ACCESS Middleware Interoperability using SOA for Enterprise Business Application T Sathis Kumar Assistant Professor Department of Computer Science and Engineering Saranathan College

More information

J2EE APIs and Emerging Web Services Standards

J2EE APIs and Emerging Web Services Standards J2EE APIs and Emerging Web Services Standards Session #4 Speaker Title Corporation 1 Agenda J2EE APIs for Web Services J2EE JAX-RPC APIs for Web Services JAX-RPC Emerging Web Services Standards Introduction

More information

Next-Generation SOA Infrastructure. An Oracle White Paper May 2007

Next-Generation SOA Infrastructure. An Oracle White Paper May 2007 Next-Generation SOA Infrastructure An Oracle White Paper May 2007 Next-Generation SOA Infrastructure INTRODUCTION Today, developers are faced with a bewildering array of technologies for developing Web

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Administering Web Services 12c (12.1.2) E28131-01 June 2013 Documentation for developers and administrators that describes how to administer Web services. Oracle Fusion Middleware

More information

REST/SOAP Harmonization proposal for Identity-based Web-Services

REST/SOAP Harmonization proposal for Identity-based Web-Services 1 2 3 4 5 6 7 8 9 REST/SOAP Harmonization proposal for Identity-based Web-Services Version: 0.4 Date: 2012-10-16 10 11 Editor: Contributors: Gaël Gourmelen, Orange 12 13 14 15 16 17 18 19 20 21 22 23 24

More information

High Volume Transaction Processing in Enterprise Applications

High Volume Transaction Processing in Enterprise Applications High Volume Transaction Processing in Enterprise Applications By Thomas Wheeler Recursion Software, Inc. February 16, 2005 TABLE OF CONTENTS Overview... 1 Products, Tools, and Environment... 1 OS and hardware

More information

Working Group Charter: Basic Profile 1.2 and 2.0

Working Group Charter: Basic Profile 1.2 and 2.0 Working Group Charter: Basic Profile 1.2 and 2.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 Web Services Basic

More information

WCF-Service-Endpoint. WCF Endpoint Components

WCF-Service-Endpoint. WCF Endpoint Components WCF-Service-Endpoint The endpoint is the fusion of the address, contract and binding. Every endpoint must have all three elements and the host exposes the endpoint. WCF Service is a program that exposes

More information

Web Services, ebxml and XML Security

Web Services, ebxml and XML Security Web Services, ebxml and XML Security Dr David Cheung Director Center for E-Commerce E Infrastructure Development Electronic Commerce Models Business to Customer (B2C) Convenient access to services Business

More information

Network Security Essentials

Network Security Essentials Network Security Essentials Fifth Edition by William Stallings Chapter 4 Key Distribution and User Authentication No Singhalese, whether man or woman, would venture out of the house without a bunch of

More information

Projects. How much new information can fit in your brain? Corporate Trainer s Profile TECHNOLOGIES

Projects. How much new information can fit in your brain? Corporate Trainer s Profile TECHNOLOGIES Corporate Solutions Pvt. Ltd. How much new information can fit in your brain? Courses Core Java+Advanced Java+J2EE+ EJP+Struts+Hibernate+Spring Certifications SCJP, SCWD, SCBCD, J2ME Corporate Trainer

More information

Enterprise Integration Using IEC

Enterprise Integration Using IEC Enterprise Integration Using IEC 61968-100 Scott Neumann, UISOL Margaret Goodrich, SISCO Michael Johnson, Elster CIMug Meeting Introduction The purpose of this presentation is to describe enterprise integration

More information

MOC 6461A C#: Visual Studio 2008: Windows Communication Foundation

MOC 6461A C#: Visual Studio 2008: Windows Communication Foundation MOC 6461A C#: Visual Studio 2008: Windows Communication Foundation Course Number: 6461A Course Length: 3 Days Certification Exam This course will help you prepare for the following Microsoft exam: Exam

More information

Integration Documentation. Automated User Provisioning Common Logon, Single Sign On or Federated Identity Local File Repository Space Pinger

Integration Documentation. Automated User Provisioning Common Logon, Single Sign On or Federated Identity Local File Repository Space Pinger Integration Documentation Automated User Provisioning Common Logon, Single Sign On or Federated Identity Local File Repository Space Pinger Revision History Version No. Release Date Author(s) Description

More information

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith ArcGIS Enterprise Security: An Introduction Gregory Ponto & Jeff Smith Agenda ArcGIS Enterprise Security Model Portal for ArcGIS Authentication Authorization Building the Enterprise Encryption Collaboration

More information

Working Group Charter: Web Services Basic Profile

Working Group Charter: Web Services Basic Profile Working Group Charter: Web Services Basic Profile Web Services Basic Profile (wsbasic) Creation Date: 2002.03.05 Revision Date: 2008.09.09 Document Editors: WS-I Secretary (secretary@ws-i.org) This Working

More information

TIBCO BusinessConnect SOAP Protocol Release Notes

TIBCO BusinessConnect SOAP Protocol Release Notes TIBCO BusinessConnect SOAP Protocol Release Notes Software Release 6.1.0 April 2015 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

Concepts of Web Services Security

Concepts of Web Services Security Concepts of Web Services Security Session MCP/OS/MTP 4066 2:45 3:45pm, Halloween 2017 MGS, Inc. Software Engineering, Product & Services firm founded in 1986 Products and services to solve business problems:

More information

Sentinet for BizTalk Server SENTINET

Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication

More information

Web Services Development for IBM WebSphere Application Server V7.0

Web Services Development for IBM WebSphere Application Server V7.0 000-371 Web Services Development for IBM WebSphere Application Server V7.0 Version 3.1 QUESTION NO: 1 Refer to the message in the exhibit. Replace the??? in the message with the appropriate namespace.

More information

SUN. Java Platform Enterprise Edition 6 Web Services Developer Certified Professional

SUN. Java Platform Enterprise Edition 6 Web Services Developer Certified Professional SUN 311-232 Java Platform Enterprise Edition 6 Web Services Developer Certified Professional Download Full Version : http://killexams.com/pass4sure/exam-detail/311-232 QUESTION: 109 What are three best

More information

National Identity Exchange Federation. Terminology Reference. Version 1.0

National Identity Exchange Federation. Terminology Reference. Version 1.0 National Identity Exchange Federation Terminology Reference Version 1.0 August 18, 2014 Table of Contents 1. INTRODUCTION AND PURPOSE... 2 2. REFERENCES... 2 3. BASIC NIEF TERMS AND DEFINITIONS... 5 4.

More information

ActiveVOS Technologies

ActiveVOS Technologies ActiveVOS Technologies ActiveVOS Technologies ActiveVOS provides a revolutionary way to build, run, manage, and maintain your business applications ActiveVOS is a modern SOA stack designed from the top

More information

Chapter 6: Simple Object Access Protocol (SOAP)

Chapter 6: Simple Object Access Protocol (SOAP) Chapter 6: Simple Object Access Protocol (SOAP) Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) alonso@inf.ethz.ch http://www.iks.inf.ethz.ch/ What is SOAP? The

More information

Ramnish Singh IT Advisor Microsoft Corporation Session Code:

Ramnish Singh IT Advisor Microsoft Corporation Session Code: Ramnish Singh IT Advisor Microsoft Corporation Session Code: Agenda Microsoft s Identity and Access Strategy Geneva Claims Based Access User access challenges Identity Metasystem and claims solution Introducing

More information

CA SiteMinder Web Services Security

CA SiteMinder Web Services Security CA SiteMinder Web Services Security Policy Configuration Guide 12.52 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

SOA-Tag Koblenz 28. September Dr.-Ing. Christian Geuer-Pollmann European Microsoft Innovation Center Aachen, Germany

SOA-Tag Koblenz 28. September Dr.-Ing. Christian Geuer-Pollmann European Microsoft Innovation Center Aachen, Germany SOA-Tag Koblenz 28. September 2007 Dr.-Ing. Christian Geuer-Pollmann European Microsoft Innovation Center Aachen, Germany WS-FooBar Buchstabensuppe WS-BusinessActivity MTOM XPath InfoSet XML WS-Management

More information

Prescription Monitoring Program Information Exchange (PMIX) Architecture. Version 1.0. April 2012

Prescription Monitoring Program Information Exchange (PMIX) Architecture. Version 1.0. April 2012 Prescription Monitoring Program Information Exchange (PMIX) Architecture Version 1.0 April 2012 Developed in conjunction with: TABLE OF CONTENTS 1 Document Purpose... 5 2 Document Scope... 5 3 Background...

More information

AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0

AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Spring 2007 TPF Users Group Spring 2007 z/tpf Web Services Update Name: Barry

More information

IEC Overview CIM University UCAIug Summit Austin, TX. 18 November 2011

IEC Overview CIM University UCAIug Summit Austin, TX. 18 November 2011 IEC 61968-100 Overview CIM University UCAIug Summit Austin, TX 18 November 2011 Agenda Introduction A look at the purpose, scope and key terms and definitions. Use Cases and Messaging Patterns What are

More information

Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0

Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0 1 2 3 4 5 6 7 8 9 10 11 Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0 Version 3.1 Editor: Kyle Meadors, Drummond Group Inc. Abstract: This document describes the test steps to achieve

More information

Open XML Gateway User Guide. CORISECIO GmbH - Uhlandstr Darmstadt - Germany -

Open XML Gateway User Guide. CORISECIO GmbH - Uhlandstr Darmstadt - Germany - Open XML Gateway User Guide Conventions Typographic representation: Screen text and KEYPAD Texts appearing on the screen, key pads like e.g. system messages, menu titles, - texts, or buttons are displayed

More information

IMS General Web Services Attachments Profile

IMS General Web Services Attachments Profile http://www.imsglobal.org/gws/gwsv1p0/imsgw... 1 8/29/2009 7:10 PM IMS General Web Services Attachments Profile Version 1.0 Final Specification Copyright 2005 IMS Global Learning Consortium, Inc. All Rights

More information

IEC Implementation Profiles for IEC 61968

IEC Implementation Profiles for IEC 61968 IEC 61968-100 Implementation Profiles for IEC 61968 Overview CIM University UCAIug Summit New Orleans, LA 22 October 2012 Agenda Introduction A look at the purpose, scope and key terms and definitions.

More information

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,

More information

API Security Management with Sentinet SENTINET

API Security Management with Sentinet SENTINET API Security Management with Sentinet SENTINET Overview 1 Contents Introduction... 2 Security Mediation and Translation... 3 Security Models... 3 Authentication... 4 Authorization... 5 Bidirectional Security

More information

API Security Management SENTINET

API Security Management SENTINET API Security Management SENTINET Overview 1 Contents Introduction... 2 Security Models... 2 Authentication... 2 Authorization... 3 Security Mediation and Translation... 5 Bidirectional Security Management...

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Understanding Oracle Web Services Manager 12c (12.1.2) E28242-01 June 2013 Documentation for developers and administrators that introduces features of the Oracle Web Services Manager

More information

Overview SENTINET 3.1

Overview SENTINET 3.1 Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7

More information

Federated Identity Manager Business Gateway Version Configuration Guide GC

Federated Identity Manager Business Gateway Version Configuration Guide GC Tivoli Federated Identity Manager Business Gateway Version 6.2.1 Configuration Guide GC23-8614-00 Tivoli Federated Identity Manager Business Gateway Version 6.2.1 Configuration Guide GC23-8614-00 Note

More information

CREATION AND CONFIGURATION OF WEB SERVICE FROM RFC AND DEPLOYMENT IN ANOTHER SYSTEM

CREATION AND CONFIGURATION OF WEB SERVICE FROM RFC AND DEPLOYMENT IN ANOTHER SYSTEM CREATION AND CONFIGURATION OF WEB SERVICE FROM RFC AND DEPLOYMENT IN ANOTHER SYSTEM Applies to: SAP Summary The purpose of this document is to provide creation and configuration of web service from function

More information

ActiveVOS JMS Transport options Technical Note

ActiveVOS JMS Transport options Technical Note ActiveVOS JMS Transport options Technical Note 2009 Active Endpoints Inc. ActiveVOS is a trademark of Active Endpoints, Inc. All other company and product names are the property of their respective owners.

More information

DEVELOPER GUIDE PART C DEVELOPMENT STEPS

DEVELOPER GUIDE PART C DEVELOPMENT STEPS DEVELOPER GUIDE PART C DEVELOPMENT STEPS Warning: This is a redacted version of the SIDES Developer Guide and is NOT the latest version. For development, log into the Members Site and obtain the latest

More information

BEAAquaLogic. Service Bus. MQ Transport User Guide

BEAAquaLogic. Service Bus. MQ Transport User Guide BEAAquaLogic Service Bus MQ Transport User Guide Version: 3.0 Revised: February 2008 Contents Introduction to the MQ Transport Messaging Patterns......................................................

More information

1Z Oracle. Java Platform Enterprise Edition 6 Web Services Developer Certified Expert

1Z Oracle. Java Platform Enterprise Edition 6 Web Services Developer Certified Expert Oracle 1Z0-897 Java Platform Enterprise Edition 6 Web Services Developer Certified Expert Download Full Version : http://killexams.com/pass4sure/exam-detail/1z0-897 QUESTION: 113 Which three statements

More information

SPDY - A Web Protocol. Mike Belshe Velocity, Dec 2009

SPDY - A Web Protocol. Mike Belshe Velocity, Dec 2009 SPDY - A Web Protocol Mike Belshe Velocity, Dec 2009 What is SPDY? Concept SPDY is an application layer protocol for transporting content over the web with reduced latency. Basic Features 1. Multiplexed

More information

INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET

INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET 1. INTRODUCTION Hello friends are topic is Internet and World Wide Web the most popular services of our topic is social networking and online shopping

More information

How to Overcome Web Services Security Obstacles

How to Overcome Web Services Security Obstacles How to Overcome Web Services Security Obstacles Dick Mackey SystemExperts Corporation Agenda Introduction to Web Services Web Services threats Web Services security standards What s here today What you

More information

Artix Building Service Oriented Architectures Using Artix

Artix Building Service Oriented Architectures Using Artix Artix 5.6.4 Building Service Oriented Architectures Using Artix Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 2017. All rights

More information

ก. ก ก (krunapon@kku.ac.th) (pongsakorn@gmail.com) ก ก ก ก ก ก ก ก ก ก 2 ก ก ก ก ก ก ก ก ก ก ก ก ก ก ก ก ก ก ก ก ก ก ก 3 ก ก 4 ก ก 1 ก ก ก ก (XML) ก ก ก ก ( HTTP) ก ก Web Services WWW Web services architecture

More information

Job Messaging Format (JMF) Tutorial

Job Messaging Format (JMF) Tutorial Job Messaging Format (JMF) Tutorial Claes Buckwalter Linköping University Sunday, January 23 2005 Print Media Academy Heidelberg Overview Transport protocols for JMF JMF Message families JMF over HTTP

More information

Applying Microservices in Webservices, with An Implementation Idea

Applying Microservices in Webservices, with An Implementation Idea International Conference on Computer Applications 64 International Conference on Computer Applications 2016 [ICCA 2016] ISBN 978-81-929866-5-4 VOL 05 Website icca.co.in email icca@asdf.res.in Received

More information

Web services (GSE NL)

Web services (GSE NL) TRAINING & CONSULTING ABIS Training & Consulting www.abis.be training@abis.be ABIS 2004 Document number: GSENL20041104cover.fm 25 November 2004 Address comments concerning the contents of this publication

More information

Industry Training Register. Guide to integration for ITOs

Industry Training Register. Guide to integration for ITOs Industry Training Register Guide to integration for ITOs Version 5.0 Objective id A823307 Published 15 January 2013 Page 2 of 29 ITR guide to integration for ITOs Contents 1 INTRODUCTION... 4 1.1 About

More information

Naming & Design Requirements (NDR)

Naming & Design Requirements (NDR) The Standards Based Integration Company Systems Integration Specialists Company, Inc. Naming & Design Requirements (NDR) CIM University San Francisco October 11, 2010 Margaret Goodrich, Manager, Systems

More information