11. Policy Central to SOA Governance Define and author corporate policies: Privacy, Integrity, Non-repudiation Identity, Access control, Credentials Reliability, performance, scalability Reusability/Discoverability Compliance to industry and corporate standards Conformance to technical standards – WS-I, SOAP, WSDL, WS-S, WSRM etc. Deploy and configure services according to policies: Physical endpoints Routing, load balancing, transport Service Level Agreements Identity stores, Access decision points Enforce policies at the edge and in the core: Alerts, Reports, Audit trails Monitor compliance with policies: Manage alerts Generate reports Forensics and Audit trails
12.
13. Policy-centric SOA Governance Architectural View Policy Enforcement Policy Definition XML Gateway (policy enforcement) XML VPN (client policy coordination) Consumer Service XML VPN (client policy coordination) Last Mile Extender (endpoint agent) Last Mile Extender (endpoint agent) Identity / Trust Identity / Trust Policy Definition Reg / Rep Sun Layer7
14.
15. Scenario: Advanced SAML Processing Blue’s Identity Server Organization Green Michelle Dimitri Program X Green’s Identity Server Organization Blue Trust Federation ID Provider & Security Token Service Authentication Responsibility STS Token Orchestration & Caching Layer Federation Policy Enforcement Point Federation Policy Application Point Federation ID Provider & Security Token Service SAML
NOTE: This is a high-level presentation of Sun's offerings for Software Infrastructure. The purpose is to introduce customers and prospects to Sun's Identity Management and Java Composite Application Platform Suites for their software infrastructure. You should add/delete slides for your appropriate audience, and if more details are needed, you should use the Sun Identity Management and Business Integration customer overview presentations. Welcome. I'm here to talk to you today about Sun's offerings for Software Infrastructure.