Summary
We have covered a lot of ground in this chapter. We started by looking at the general concepts surrounding integration before moving on and looking at some of the older and more modern integration approaches. We achieved this by looking at different types of tools and mechanisms. We also learned about some of the ideal use cases for each of these tools.
We then moved on to a closely-related architectural topic: security and cryptography. We learned some key concepts in the wide and complex world of cryptography and tied them back to some real-world examples that we come across every day.
Finally, we tied all this together and learned how integration and cryptography can work side by side in the enterprise landscape.
In the next chapter, we will cover another key architectural concept. Identity and access management (IAM) architectural concepts are now extensively used in modern distributed solutions. These IAM concepts are closely related to both the integration and...