Databases Reference
In-Depth Information
From the list of available policies, which may be filtered by Category , we can
choose and apply the appropriate policy. For example, oracle/wss_username_token_
service_policy expects a username and a password to be provided in a WS-Security
SOAP header. After clicking on Submit , the policy will be attached to the service.
Because policies can be shared between OSB and the SCA-based service engines, it is
possible to create a customized policy and apply it to services in both containers.
Final thoughts on security
The examples used in this chapter have been based on HTTP basic authentication or
a simple username/password that does not require configuration of certificate stores.
To properly secure services, it is recommended that a public key infrastructure is
used in conjunction with an LDAP server to provide secure message delivery
and centralized user management. The preceding steps are appropriate for use
in development and test environments without access to an LDAP store or a
PKI infrastructure.
Monitoring services
In addition to defining policies to be applied to requests, the Fusion Middleware
Control Console can also monitor the performance of services.
 
Search WWH ::




Custom Search