SECTION 10 EXCHANGE PROTOCOL

Similar documents
Promoting semantic interoperability between public administrations in Europe

1. CONCEPTUAL MODEL 1.1 DOMAIN MODEL 1.2 UML DIAGRAM

EUROPEAN COMMISSION. DIGIT DG CNECT Connecting Europe Facility. SML and SMP. Component Offering Description. CEF edelivery Building Block

User guide User Guide CIPA Administration Console

User Guide CIPA Administration Console Open e-trustex

Automation for Web Services

BEAAquaLogic Enterprise Repository. Automation for Web Services Guide

Towards semantic asset management and Core Vocabularies for e-government. Makx Dekkers Stijn Goedertier

A common metadata approach to support egovernment interoperability

SDN Community Contribution

Participant User Guide, Version 2.6

Global ebusiness Interoperability Test Beds (GITB) Test Registry and Repository User Guide

For each use case, the business need, usage scenario and derived requirements are stated. 1.1 USE CASE 1: EXPLORE AND SEARCH FOR SEMANTIC ASSESTS

BEXIS Release Notes

Security Assertions Markup Language (SAML)

Fusion Registry 9 SDMX Data and Metadata Management System

CMDP-LIMS INTERFACE CONTROL

case study The Asset Description Metadata Schema (ADMS) A common vocabulary to publish semantic interoperability assets on the Web July 2011

Integrating the UK Location Information Infrastructure and data.gov.uk

Conformance Testing. Service Offering Description

Proof of concept AS4. Version 1 Revision ITC-KG AS4 Proof of Concept 16 January 2014 Draft INT

(9A05803) WEB SERVICES (ELECTIVE - III)

Synchronization of Services between the IBM WebSphere Services Registry & Repository and SAP s Services Registry

Global Reference Architecture: Overview of National Standards. Michael Jacobson, SEARCH Diane Graski, NCSC Oct. 3, 2013 Arizona ewarrants

SDMX GLOBAL CONFERENCE

Access SAP Business Functions (ABAP) via Web Services

Vocabulary Harvesting Using MatchIT. By Andrew W Krause, Chief Technology Officer

Glossary of Exchange Network Related Groups

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

EVAL Module v. 2.0 User Manual for Contractors

The MEG Metadata Schemas Registry Schemas and Ontologies: building a Semantic Infrastructure for GRIDs and digital libraries Edinburgh, 16 May 2003

Corporate Office. Copyright and Trademarks. Release Notice. VirtualSite Solutions LLC Westmoor Drive Westminster, CO USA

Identity Provider for SAP Single Sign-On and SAP Identity Management

Developing Solutions for Google Cloud Platform (CPD200) Course Agenda

> Semantic Web Use Cases and Case Studies

FAQs. Business (CIP 2.2) AWS Market Place Troubleshooting and FAQ Guide

SAML-Based SSO Configuration

Web Services in Cincom VisualWorks. WHITE PAPER Cincom In-depth Analysis and Review

Service Oriented Architecture

Gathering requirements for the extended federation of interoperability assets

ForeScout CounterACT. Configuration Guide. Version 3.4

National Identity Exchange Federation. Terminology Reference. Version 1.0

Agent-Enabling Transformation of E-Commerce Portals with Web Services

Use Plug and Play to Deploy New Devices

Federation Operator Practice: Metadata Registration Practice Statement

ForeScout Open Integration Module: Data Exchange Plugin

IEC Implementation Profiles for IEC 61968

Using ZENworks with Novell Service Desk

An RDF NetAPI. Andy Seaborne. Hewlett-Packard Laboratories, Bristol

Oracle Service Bus. 10g Release 3 (10.3) October 2008

On the Creation & Discovery of Topics in Distributed Publish/Subscribe systems

Inland Revenue. Build Pack. Identity and Access Services. Date: 04/09/2017 Version: 1.5 IN CONFIDENCE

Kerberos for the Web Current State and Leverage Points

ISA: Interoperability Solutions for European public Administrations

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager

OPC UA Configuration Manager PTC Inc. All Rights Reserved.

Selftestengine.P questuons P IBM FileNet P8 System Implementation Technical Mastery Test v1

NIELSEN API PORTAL USER REGISTRATION GUIDE

SAML 2.0 SSO. Set up SAML 2.0 SSO. SAML 2.0 Terminology. Prerequisites

FAQ. General Information: Online Support:

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University

SUN. Java Platform Enterprise Edition 6 Web Services Developer Certified Professional

SAT for eid [EIRA extension]

Prescription Monitoring Program Information Exchange (PMIX) Architecture. Version 1.0. April 2012

AssetWise to OpenText PoC Closeout Report

CPM. Quick Start Guide V2.4.0

What s Out There and Where Do I find it: Enterprise Metacard Builder Resource Portal

RNE Common Components System (CCS)

JAVA COURSES. Empowering Innovation. DN InfoTech Pvt. Ltd. H-151, Sector 63, Noida, UP

Managing Learning Objects in Large Scale Courseware Authoring Studio 1

ISA Programme. interoperability effect on the EU public administrations. 20 th XBRL Eurofiling Workshop 26/11/2014

B2B STRATEGIES FOR COMPETITIVE ADVANTAGE. ebxml TRP.

Welcome to the Investor Experience

Oracle Fusion Middleware

ER/Studio Enterprise Portal Evaluation Guide. Published: March 6, 2009

Federation Operator Practice: Metadata Registration Practice Statement

All requests must be authenticated using the login and password you use to access your account.

Testking.P questuons

Lab 3: Simple Integration Use Case

An Overview. Version Quadient Group AG Quadient Group AG

edocument for Italy - SAP Cloud Platform Integration Guide

SAML-Based SSO Solution

Symantec Endpoint Virtualization 6.1 SP8 Release Notes

Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006

Joining the BRICKS Network - A Piece of Cake

Integration Documentation. Automated User Provisioning Common Logon, Single Sign On or Federated Identity Local File Repository Space Pinger

Secure Messaging Buyer s Guide

Building for the Future

A RESTful Approach to Identity-based Web Services

UN/CEFACT FOR GLOBAL BUSINESS BUSINESS REQUIREMENTS SPECIFICATION (BRS) Fishing License Authorization & Permit (FLAP) domain

The Soap Response Failed Schema Validation Eclipse

Oracle Enterprise Manager. 1 Introduction. System Monitoring Plug-in for Oracle Enterprise Manager Ops Center Guide 11g Release 1 (

Webinar IUCLID 6 Questions and Answers

Biocides Submission Manual

System Administrator s Guide Login. Updated: May 2018 Version: 2.4

The European Commission s science and knowledge service. Joint Research Centre

SAP Pharma Network Onboarding Guide

ForeScout Extended Module for Tenable Vulnerability Management

5.3 Using WSDL to generate client stubs

ephyto IPPC Solutions

Transcription:

SECTION 10 EXCHANGE PROTOCOL The ADMS specification will facilitate the creation of a federation of disparate semantic asset repositories at the EU level. This federation will consist of Joinup setting up an infrastructure to provide a single point of access allowing users to cross-query and discover relevant assets stored in different repositories, respecting the autonomy of each repository. It will allow semantic interoperability assets to be compared and potentially linked to one another in a crossborder or cross-sector setting, allowing users to more easily detect semantic commonalities and differences. The objective of this document is to describe a possible architecture of the federation of semantic asset repositories that can maximise the sharing of asset metadata and their availability to end-users. The following key concepts are used in this section: Term Definition Acronym Protocol Set of formats and rules to exchange asset description metadata Repository Local Repository Central Repository A network accessible system that contains a set of asset description metadata. A repository which plays the role of data provider, responsible for exposing metadata to the central repository of the federation. The repository of the federation responsible for storing a copy of the asset description metadata of the entire federation in its local database. It is the single point of access for all the federated queries. - - - - 1.1 CONCERNS The table below shows the set of stakeholders and related concerns. Table 0.1 List of stakeholders and related concerns Stakeholder Concern ID Central owner repository All asset description metadata stored in the repositories of the federation should be accessible from the central repository CON1 All asset description metadata stored in the repositories of the federation should be shared by the repositories of the federation in the same format (or in the same limited set of formats). CON2

All asset description metadata should be stored locally on the central platform in order to speed up queries by the users. CON3 The communication protocol should allow the central repository to identify the specific repository from which the metadata are received. CON4 The exchange protocol should allow the central repository to receive new assets metadata, updates of existing asset metadata and deletion of existing asset metadata. CON5 Local owner repository The exchange protocol should allow the repository owners to maintain the total control of the metadata stored in their systems. CON6 The exchange protocol required to share asset metadata stored in the repository should not require extensive implementation efforts. CON7 The repository owner should be able to decide what assets to share with the federation. CON8 The repository owner should be able to decide when to share the asset description metadata with the federation. CON9 The remainder of this section lists possible solutions that meet the above-mentioned stakeholder concerns. Please note that it is likely that more than one exchange protocol will be used in practice: a multi-channel approach is recommended, according to the needs and the requirements of the different local repositories. A one-fits-all solution is, especially in the first stages, not likely to be adopted: the requirements, the technical/business constraints and the maturity level can be vary significantly for each repository of the federation.

1.2 EXCHANGE PROTOCOL 1 REST WEB SERVICES This solution, which tries to address the concerns listed in section 1.1, is based on a centralized architecture pattern. Figure 1. Centralized Architecture Pattern Push Strategy The central repository is fed by asset description metadata coming from the local repositories. Asset description metadata are exchanged in the ADMS format via REST-based web services. The message exchange protocol uses a push strategy, meaning that the central repository exposes a web service, which is called by the local repositories to send the ADMS messages.

Metadata are sent to the central repository using the REST Web Service Local repository Central repository Mapping Tool Web Service Client REST Web Service Metadata are mapped by the mapping tool from the internal to the ADMS representation Received metadata are validated by the service and stored in the central reposiory s Database Datasource Metadata are extracted from the datasource in the internal representation Database Figure 2. Push strategy with Web Services Messages are transported using the HTTP protocol. The HTTP headers are used to transport the following information: Repository Id: this is the id of local repository sending the message to the central repository. Last modified: this is the date and time when the last change has been made on the asset description metadata stored in the local repository. The payload of the HTTP message contains the ADMS representation (using the XML or RDFa format) of all the assets stored in the local repository that the repository owner wants to share with the federation. Therefore, local repositories will have to map their current internal asset metadata structure the ADMS representation before calling the REST service. Asset metadata received by the central repository via the service will be validated (e.g. basic XSD validation, but more complex business rules can be implemented using Schematron) and stored locally in the central repository s database, so that end users can access the central repository platform to access the asset description metadata of the entire federation. HTTP basic authentication can be used to identify the repositories using the REST service on the central repository. A registration procedure is then foreseen for the repositories that want to be part of the federation. The registration procedure can be manual in the first stages: the owners of new repositories will contact the central repository s administrator to include the ID of their repository in the database. They will receive then the credentials used for authentication when calling the REST service via the client. In order to help the local repositories with the implementation of the proposed solution, a Java sample implementation of the service client can be provided by the EC. Local repositories will be able to download the sample implementation from the central repository s website and to integrate it in their local environment. The client can offer the following interfaces to load and send the asset description metadata:

Java interface: the client can be integrated into a Java environment by importing the provided JAR as a library in an existing Java project. The interface classes of the library will accept the ADMS representation as an input, and the core classes will take care of sending the ADMS message to the central repository. This is the preferred solution to fully automate the entire process (extract, transform, send), but it will require some implementation effort to integrate the client. GUI: the client will provide a user interface, by which the user will be able to upload the previously generated ADMS file from his own machine, and to send it to the central repository by clicking a button on the user interface. This solution will not require any implementation effort to integrate the client, but it will require human intervention whenever new asset metadata have to be sent. It also requires that the transformation to ADMS of the asset metadata description has already been done via the mapping tool. GUI + spreadsheet import: the client will provide a user interface, by which the user will be able to upload a spreadsheet (e.g. ODS file) containing all the information about the asset metadata of the repository. The template of the spreadsheet will be provided along with the client, and it will be up to the user to fill it with the correct information. After the import of the spreadsheet, the client will take care of transforming the data contained in the file to the ADMS format, and to send it to the central repository. This solution will not require any implementation effort, neither for the integration of the client or for the mapping. As explained, the mapping will be done by the client itself. However, it will require significant manual work from the user to fill the spreadsheet and to use the GUI whenever new asset metadata have to be sent. The following table summarizes how the proposed solution addresses the stakeholder s concerns. Concern ID CON1 CON2 CON3 CON4 CON5 CON6 Related benefit of the solution The asset metadata description of the entire federation will be accessible by the end-users using only the central repository s user interface. ADMS XML or RDF representations are used as standard format to share the asset description metadata. The asset metadata description received through the REST service will be stored locally in the central repository s database. The ID of the repository sending the asset description metadata is included in the message header of the HTTP message. The proposed protocol allows to send a full update of the entire local repository when the REST service is called. By doing so, all the updates in the local repository (creation, deletion and update of assets) will be reflected in the central repository. The proposed solution doesn t require external entities (e.g. the central repository) to access or to control local repositories data.

CON7 CON8 CON9 REST services don t require extensive implementation efforts. The service interface is very simple and based on plain HTTP messages, without the need of implementing complex SOAP-based WS-* Standards. A sample implementation of the client will be available. The local repository owner can decide which internal asset description metadata they will share with the federation. The local repository owner can decide when to send the new or updated asset description metadata: e.g. the metadata can be sent to the central repository as soon as they are available, or a batch of new/updated assets can be sent every day or every week. 1.2.1 Example scenario In this section an example scenario of asset description metadata sharing is presented. In the scenario, the owner of the repository A (which did not yet register its repository on the central repository) wants to share the asset description metadata with the federation. 1. The owner of repository A contacts the administrator of the central repository and requests the registration of his repository in the federation. 2. The central repository s administrator registers the repository A in the central repository s database (repository ID will be A in the central repository) and provides the owner of repository A with the credentials for authentication. 3. The administrator of repository A downloads the REST service client, installs it and configures it (e.g. setting the previously received credentials for authentication). 4. The administrator of repository A extracts the asset description metadata from the repository A s database and uses the mapping tool to convert it into the ADMS format (this can be an automated procedure depending on the level of integration of the repository A s environment). 5. The administrator of repository A loads the ADMS asset description metadata into the service client and launches the client to send the message (this can be an automated procedure depending on the level of integration of the repository A s environment). 6. The REST service receives the message, checks the credentials of the sender and validates the message. 7. If the message is valid, the REST service stores the received asset description metadata in the central repository s database. 1.3 EXCHANGE PROTOCOL 2 E-MAIL The solution described in Error! Reference source not found. Error! Reference source not found. guarantees a high level of integration and interoperability between local and central repositories. However, this comes at the price of greater efforts in terms of development and time to market for the local repositories. Although a web service client is provided, it needs to be configured and integrated with the existing systems. In order to tackle the issue described above and speed up the integration of local repositories into the federation, a complementary solution might be adopted when needed. It is based on the

same centralised architecture described in Error! Reference source not found. but it uses e- mails as a transport to transmit the asset description metadata. The local repositories, after exporting the set of asset description metadata from their databases and mapped them into the ADMS format, will have the possibility to send them via email to a pre-defined email address. The system administrator (or an automatic procedure) of the central repository will read the metadata from the email inbox and import them into the central repository s database. This approach hampers the interoperability between local and central repositories and requires manual intervention for the exchange of metadata. However, it will reduce the development efforts, the time to market and the cost of the solution. This approach is then recommended for a first implementation of the system, or for local repositories with a low maturity level in terms of system integration and web-based technologies implementation. 1.3.1 Example scenario In this section an example scenario based on the exchange protocol 2 is presented. In the scenario, we assume that the owner of the local repository A wants to share the asset description metadata with the federation and an authorisation agreement (to perform the action) with the central repository already exists. 1. The administrator of the local repository A exports the asset description metadata from the repository A s database into an agreed format (XML, RDF). The export can be done manually or using existing systems (depending on the repository A s existing environment). 2. The administrator of the local repository A sends the exported metadata to a pre-defined email address in compliance with an agreed message format (this can be an automated procedure depending on the level of integration of the repository A s environment). 3. The system administrator (or an automatic procedure) of the central repository reads the the metadata from the email inbox. 4. The system administrator (or an automatic procedure) of the central repository imports the asset description metadata by submitting them to the REST services exposed by the central repository itself. 5. If the message is valid, the REST service stores the received asset description metadata in the central repository s database. 1.4 EXCHANGE PROTOCOL 3 - HARVESTING This section describes a solution based on the harvesting strategy. The message exchange protocol, in this case, uses a pull strategy, meaning that the asset description metadata are retrieved by the central repository from the local repositories. To make the asset description metadata available for retrieving, the local repositories publish them, in ADMS format, on a web page of their web server. The endpoint of the web server must be previously registered in the central repository.

Figure 3. Centralized architecture pattern Pull strategy As described in Figure 4, the mapping to ADMS format will be a responsibility of the local repository. Therefore, before publishing the information on the web server, the local repositories will have to perform the mapping from their internal format to ADMS (in its XML or RDF representation). The solution foresees a simple HTTP request/response pattern to retrieve the ADMS file from the local repositories. The central repository uses a web client to automatically retrieve the latest snapshot of asset description metadata from all the local repository, on a regular timebasis. Figure 4. Pull strategy with ADMS web page The registration on the central repository can be done in two ways:

Manual registration: an e-mail is sent by the local repository owner to the central repository administrator, containing the ID of the local repository and the address of the endpoint where to retrieve the asset metadata. The central repository administrator takes charge of storing the information in the central repository database and to configure the web client accordingly. Automated registration: a registration web-service is provided by the central repository, which is called by the local repository to send/update the ID and the endpoint address information. The manual solution can be used for an initial stage of the federation, or for local repositories that are not in the condition to implement a client on their side. The architecture can be adapted to the needs of the local repositories. In particular: The interval between two subsequent retrievals can be adapted according to the frequency of the updates on the local repositories; The HTTP Web client can be configured to use HTTP basic authentication (or other security mechanism) when accessing the local repositories; The Web client can be adapted to call REST services for retrieving ADMS files, if such services are provided by the local repository. This solution suits well for non-centralized architectures: by publishing on an web page the asset description metadata on ADMS format, other repositories (in addition to the central one), will be able to harvest the ADMS file from any local repository. Concern ID CON1 CON2 CON3 CON4 CON5 CON6 CON7 Related benefit of the solution The asset metadata description of the entire federation will be accessible by the end-users using only the central repository s user interface. ADMS XML or RDF representations are used as standard format to share the asset description metadata. The asset metadata description retrieved from the local repositories will be stored locally in the central repository s database. The ID of the repository sending the asset description metadata is sent during the registration phase. The proposed protocol allows retrieving a full update of the local repository asset metadata. By doing so, all the updates in the local repository (creation, deletion and update of assets) will be reflected in the central repository. The proposed solution doesn t require external entities (e.g. the central repository) to access or to control local repositories data. No implementation effort is required to implement the protocol. Only a web server where to publish the asset description metadata in ADMS

format is needed. CON8 CON9 The local repository owner can decide which internal asset description metadata they will share with the federation, by deciding what to publish on the web page. The interval between two different requests from the central repository can be tuned according to the needs of the local repository. 1.4.1 Example scenario In this section an example scenario based on the exchange protocol 3 is presented. In the scenario, we assume that the owner of the local repository A wants to share the asset description metadata contained in its repository with the federation and that he/she has not registered his/her repository on the central repository. 1. The administrator of the local repository A exports the asset description metadata from the repository A s datasource into the ADMS format (XML or RDF). The export can be done manually or using existing systems (depending on the repository A s existing environment). 2. The administrator of the local repository A publishes the exported file on its web server, whose address has already been sent to the central repository (see point 1). 3. The administrator of the local repository A sends an e-mail to the administrator of the central repository, containing the ID of its repository and the endpoint address (the exact URL where the web page containing the ADMS file of the local repository can be found). 4. The administrator of the central repository reads the e-mail, and updates the central repository database with the received information, thus registering the local repository. 5. The central repository web client starts to poll the local repository s web page periodically (the actual time intervals can be defined/adapted). The ADMS file published by the local repository s administration will be retrieved each time. 6. If the ADMS file is valid, the central repository web client stores the received asset description metadata in the central repository s database. 1.5 EXCHANGE PROTOCOL 4 FILE UPLOAD This section describes a simple solution based on the upload of asset description metadata files on the central repository. A web page can be created on central repository, by which the local repository administrators/owners can upload a file which contains the asset description metadata of the assets stored in their repository. Two possibilities are foreseen for the file format: ADMS format (XML or RDF): before uploading the file on the central repository page, the local repository administrator performs the mapping from their internal format to ADMS (in its XML or RDF representation). Files are then processed by the central

repository, which will validate its content and store the information in the central repository s database. Spreadsheet: a spreadsheet template (e.g. in ODS format) is given to the local repositories owners/administrators, who will manually fill in the spreadsheet with the information on their asset description metadata. The spreadsheet is then uploaded to the central repository using the upload web page. The file is then processed by the central repository, which will convert it to ADMS, validate its content and store the information in the central repository s database. This solution requires some manual activities from the local repository administrators/owners who will have to perform the manual upload of the file whenever they want to share an update of their assets description metadata. If the spreadsheet solution is adopted, the manual activity of filling in the template is also to be considered. However, this solution does not require any effort to implement the communication protocol, since is completely manual and it does not require any service or client on the local repository s side. 1.5.1 Example scenario In this section an example scenario based on the exchange protocol 4 is presented. In the scenario, we assume that the owner of the local repository A wants to share the asset description metadata contained in its repository with the federation using a the spreadsheet template. 1. The administrator of the central repository sends an e-mail to the administrator of the local repository A containing the spreadsheet template. 2. The administrator of the local repository A fills in the template with the information about the asset metadata contained in its repository. 3. The administrator of the local repository A, using a web browser, logs in on the central repository s upload web page, and uploads the spreadsheet. 4. The central repository s platform processes the uploaded spreadsheet and validates it. 5. If the spreadsheet is valid, the central repository s platform converts it into the ADMS format and stores the received asset description metadata in the central repository s database.

1.6 SUMMARY OF THE SOLUTIONS The following table presents a summary of the pros and cons of the four solutions described in this document. Solution Pros Cons Solution 1 - REST Web Services Fully automated Client provided by DIGIT Higher implementation effort Solution 2 - E-Mail Minimum implementation effort Manual procedures are required Lower integration Solution 3 - Harvesting No communication protocol needs to be implemented on local repository side Requires higher availability of local repository systems Solution 4 - Upload on the central repository No communication protocol needs to be implemented Mapping to ADMS is not needed for spreadsheets Manual procedures are required Lower integration