Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Oracle SOA Suite 11g Administrator's Handbook

You're reading from   Oracle SOA Suite 11g Administrator's Handbook This book will quickly become your constant companion in achieving the reliability and security you want in your day to day administration of Oracle SOA Suite 11g. Covers both broad concepts and real-world implementation.

Arrow left icon
Product type Paperback
Published in Aug 2012
Publisher Packt
ISBN-13 9781849686082
Length 380 pages
Edition 1st Edition
Arrow right icon
Toc

Table of Contents (16) Chapters Close

Oracle SOA Suite 11g Administrator's Handbook
Credits
About the Authors
Acknowledgement
About the Reviewers
www.PacktPub.com
1. Preface
1. SOA Infrastructure Management: What you Need to Know FREE CHAPTER 2. Management of SOA Composite Applications 3. Monitoring Oracle SOA Suite 11g 4. Tuning Oracle SOA Suite 11g for Optimum Performance 5. Configuring and Administering Oracle SOA Suite 11g 6. Troubleshooting the Oracle SOA Suite 11g Infrastructure 7. Configuring Security Policies for SOA Composites 8. Managing the Metadata Services Repository and Dehydration Store 9. Backup and Recovery

Chapter 7. Configuring Security Policies for SOA Composites

Securing composite applications is a critical and pressing requirement especially in a service oriented environment where business processes need to interact with numerous external service providers, vendors, and trading partners. Setting up security at the infrastructure as well as the application level is of primary importance while dealing with both on premise (departmental or internal) and external web services such as cloud based, across DMZs (Demilitarized Zones), and so on.

Whether it's choosing when to use SSL for encrypted HTTP transport, authenticating and authorizing users across different systems, or preserving message integrity, significant effort is put into protecting information that is critical and privileged to businesses. A security exposure can be disastrous and, therefore, protecting data in business transactions is critical to reducing security related risks. Add to this the fact that security requirements...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at ₹800/month. Cancel anytime