| Control Panel | AAA FrameWork | Dubtes | Links | End |
Funciones :
Serveis :
Features/caraterísticas :
"A" => aceleración
Powered by unique purpose-built technology,
DataPower XML Accelerator XA35 is a true network device
capable of off-loading overtaxed servers
by processing XML, XSD, XPath, and XSLT at wirespeed.
The flexibility of the XA35 allows it to be installed in any number of different locations within the enterprise
to off-load Web and application servers from the arduous task of XML processing.
"S" => seguridad
Because corporations are struggling to deal with resource constraints, diverging business goals,
and the requirement to assimilate new technology,
DataPower XML Security Gateway XS40 is a network appliance
that is easy to install and maintain,
satisfying both application and network groups
while supporting current and pending security standards out-of-the-box.
"I" => integración
DataPower Integration Appliance XI50 delivers common message transformation, integration, and routing functions
in a network device, cutting operational costs and improving performance.
By making on demand data integration part of the shared Service-Oriented Architecture (SOA) infrastructure,
the XI50 is one of the few non-disruptive technologies for application integration.
The DataPower appliance uses the concept of Domains to separate logical configurations.
All objects that you create on the DataPower device have names. These names are used primarily for identifying objects or referring to them from other objects. They are not visible from outside of the DataPower environment.
The DataPower appliances have four Ethernet ports, each with an associated IP address. In addition, virtual IP addresses can be defined. The wizard chose a default value of 0.0.0.0, which specifies that the service should listen on ALL IP addresses configured on the appliance.
Terminologia Datapower
Hardware especializado :
Firmware :
Acceso al DataPower :
Crecimiento : añadir HW + balancedor de carga delante.
Se requiere un filtro de IPs delante del DataPower.
Objective : to offload (and accelerate) XSL transformations.
Request is http://datapower:8001/labs.xml We shall send back http://demoserver/labs.xml transformed using http://demoserver/pagelayout.xsl
The XSL proxy can function in two modes. The XSL proxy service mode performs all transformations inline with the request. It can transform the inbound request or the outbound response. It sits between the client and the server. This scenario is the preferred and most widely used. When an XSL proxy is configured in co-processor mode, it acts as a call-out from a process, such as a Java program. Instead of using XML/XSL specific jars, a DataPower jar is used and will make calls to the DataPower hardware for XSL transformation.
DataPower XML services have two modes when performing XSL transformations: streaming and buffered. The default is buffered, where an inbound (or outbound) XML document is completely parsed prior to beginning an XSL transformation against it. This is similar to the DOM parser model. In some circumstances, it may be advantageous to begin the transformation process as the XML document is being streaming through the device. Streaming mode is similar to the SAX parser model. This is particularly advantageous when the inbound XML document is excessively large (i.e. half gigabyte per file). The DataPower device will automatically switch to streaming mode in the event that it determines that a received file is too large. It can also be configured to always attempt to use streaming mode. Of course, streaming mode comes with a price - the some XSL functions, such as sorting, or look-ahead searching, obviously cannot be used in streaming mode. The onboard XSL compiler marks compiled stylesheets as capable or incapable of being used in streaming mode.
Objective : to validate an XML message against a XSD schema.
Request post soapMsg.xml http://datapower:40101 is verified against simpleSchema.xsd
We'll start with an XML Firewall that simply validates the inbound message against a schema while simultaneously checking for XML threats and malformed content. In general, DataPower acts as a full service proxy between a client and a server. When a request arrives, DataPower processes the request (checking for threats, transforming, etc), then forwards the request out the back to the original destination (or it can be routed to a new destination). The same process is repeated for the response from the server.
Objective : verify a XML message has no threat
Request post soapSqlThreat.xml http://datapower:40101 is scanned using SQL-Injection-Filter.xsl to watch for SQL-Injection-Patterns.xml
SQL Injection is an attack technique used to exploit web sites
that construct SQL statements from user-supplied input.
At the heart of the SQL injection threat protection mechanism is an XSL stylesheet
that contains logic to scan the entire inbound XML message.
First it strips all of the XML tags out of the document,
leaving only the remaining attribute and element values,
then it steps through each value
and compares them against a list of patterns that represent potential injection threats.
If one matches, the entire document is rejected.
The patterns are represented as regular expressions.
You can easily add additional regular expressions to the pattern matching criteria.
Objective : transform the inbound message against a simple XSL template.
Request post soapMsg.xml http://datapower:40101 is transformed using productTransform.xsl
Show how custom XSL templates are used within a processing rule.
Objective : add a digital signature to the message. We can also verify it.
Request post soapMsg.xml http://datapower:40101 is signed using datapower.abc.com-privkey.pem
Response post signed.xml http://datapower:40101/verify is verified using datapower.abc.com-sscert.pem
Sender first provides his public key to the recipient. To digitally sign a message, sender:
To verify the signature, the recipient must:
Objective : to encrypt the inbound request message, and test the decrypt mechanism.
Request post soapMsg.xml http://datapower:4nn01 > encrypted.xml
is encrypted using MyPublicCert.
We can see it decrypted
post encrypted.xml http://datapower:4nn01/decrypt
using MyPrivateKey.
Encryption basics :
Objective : authentication, authorization and audit services.
Goals :
Objective : authentication, authorization and audit services, customized with XSLT
When the built-in functions don't meet the needs, any one of the seven AAA steps can be customized using XSL.
Authorization function will be performed by customLdapAZ.xsl
Objective :
Objective : add protocol level security to the firewall service
post soapMsg.xml http://datapower:40101 does not work anymore
sslpost soapMsg.xml https://datapower:40101 works as before
Objective : create a WS-Proxy service by uploading a WSDL
The request
sent by post soapAdd.xml http://datapower:4nn02/MathServer/services/MathServer produces as output :
Objective :
Ex 1 : The WS-Policy document that you'll attach requires that all inbound messages contain either a version 1.0 or version 1.1 UsernameToken element in the WS-Security header {MathServer.wsdl}
Ex 2 : WS-Policy requires that all inbound messages contain a UsernameToken element, and outbound "add" and "subtract" responses should be digitally signed {MathServerWithPolicy.wsdl}
Objective :
Objective : configure the DataPower appliance to mediate between HTTP and WebSphere MQ
Params :
Objective : make content-based routing decisions based on some criteria from the inbound message
We define the discriminator string as "/MathServer/services/MathServer" The matching request is forwarded to "http://MathServer:9080/MathServer/services/MathServer" whilst the non-matching shall go to "dpmq://MyMqManager/?RequestQueue=MathRequests;ReplyQueue=MathReplies".
So, post soapAdd.xml http://datapower:40109/MathServer/services/MathServer request shall use WS, while post coboladd.dat http://datapower:40109 shall go to MQ queue, where the answer is generated using a program.
Objective : allow FTP clients to post transactions using standard FTP.
We start a "FTP Server Front Side Handler" as "Front Protocol"
Objective :
Ex 1 : Transforming the SOAP message into a Flat Record (COBOL copybook)
Ex 2 : Transforming the Flat Record response (from COBOL) into XML
Create and deploy Data Web Services on WebSphere DataPower XI50 Integration Appliance
Intro : we shall focus on DataPower as a transformation and protocol conversation engine to transform Web service requests into database calls and the result back into service responses to implement a data access service.
A transformation is defined by a set of rules which determine how an input is mapped to an output. A very common format for Web service is XML. XSL is a way to define such kind of mapping rules for XML-based inputs. DataPower provides first class support for XSL processing with it's purpose-build XML and XSL processing stack. Therefore, XSL is used to transform service requests into database calls and back. DataPower provides the XSL <dp:sql-execute> extension element to perform the database access operations.
Overview
POT - "XI50 can perform all labs in this document"
RedBooks :
DataPower homepage; + XS40, XML Security Gateway; + XI50, Integration Appliance;
Cursos : SW550 i SW551.
J.A. Flores :
|
Site under construction. |
|
Actualitzat el 06/04/2009.
|
|