SlideShare ist ein Scribd-Unternehmen logo
1 von 7
WEB API
Deliver Company Services as Cloud to
Developers, 3rd parties etc…
Tansu Daslı
Osman Ozel
DATAPOWER
Key Points
• Hardened security: It can act purely
as a security gateway.
• Appliance versatility: It is easy to add
to the the network at various points to
perform different functions.
• XML lingua franca: The promise of
XML-speak is uniformity, simplicity, and
transparency of handling data. Being
XML-centric from core upwards gives
DataPower the ability to adapt to
different roles.
• Any-to-any transformation: The ability
to transform any data format allows it
to be an integration device.
• Multi-protocol support: This allows it to
be a integration device or bridge for
heritage applications.
Ease of Use
• Installation: As a network appliance it
can be up and running in literally a
few minutes.
• Development cycle: On-board Web
GUI based approach to creating and
managing applications gets rid of the
develop-deploy round trip
development methodology.
• Development model: The modeling
uses the building-block approach
where the application is built using a
collection of objects one on top of
another. The granularity of these
objects maps comfortably to
architectural components of typical
applications.
DataPower
Core services
Multi-Protocol Gateway
Web Service Proxy
XML Firewall
Web Application Firewall
Access to a third-party Web service, described by a
WSDL, is front-ended by the Web Service Proxy.
Access to a specific operation, is controlled by an
Authentication, Authorization, and Auditing Policy (AAA)
that extracts identity information from the WS-Security
Username-Token. Requests exceeding specified service
level parameters are queued and bleed off at the
specified rate. Access to all other operations is
unrestricted.
The XML firewall service is used to send and receive XML
traffic over HTTP to and from XML-based applications.
• Accept and send SOAP, raw XML, or unprocessed (binary)
documents.
• Decrypt, encrypt, filter, transform, and validate XML
documents.
• Route XML documents to the appropriate back-end service.
• Sign documents and verify signatures.
• Process large documents in the streaming mode.
• Implement document-level security or service-level security.
• Communicate with clients, servers, and peers with SSL
encryption.
An external client to connect to the Web application firewall service in
DataPower. Once authenticated, request is forwarded to the back-end
Web application.
The Web application firewall service uses an AAA policy to validate users. In
a production environment, you would also need to secure the connection
from the Web application firewall service to the back-end Web application,
using either a security token or SSL.
Web Services &
Policy Management
Traffic throttling : This is a simplified model of controlling throughput of messages by discarding
packets that go over a certain threshold. DataPower’s Limit field sets the threshold, and an
interval is set for duration of throttling.
Traffic shaping : An SLM that can improve delivery while maintaining SLAs on performance by
protecting bandwidth.
Custom SLM statements
Count all (default) : The threshold level is applied to the resources specified by a resource class.
Count errors : The threshold is based on errors.
Back-end latency : The threshold is based on server latency.
Internal latency : The threshold is based on internal latency (processing time).
Total latency : The threshold is based on the sum of measured latencies.
Security
• Protocol-based security, including SSL
• Message-based security, including digital signature generation and
verification, as well as data encryption and decryption
• The Authentication/Authorization/Audit (AAA) framework for access control
• Federated Identity Management
WS-Security
Security Assertion Markup Language (SAML)
XACML PEP/PDP
Kerberos and SPNEGO
XML threats
Multiple-message XDoS attacks
Unauthorized access attacks
Data integrity/confidentiality attacks
Systems compromise attacks
Single-message xDOS attacks
High Level Architecture
operation
SOAP
WS
SOAP
WS
Datapower
cloud domain mw domain
Security
Throttle
Developers
3rd Parties
apigee/w2o/mashery/ibm/3scale
Security
Throttle
soap-ws
Monitoring
Billing
Developer Portal
HTTP
over
XML
Restfull
WS
restful-ws
D
M
Z
C
O
M
P
A
N
Y
Monit
oring
OTA
Developer Portal
confluence
developer
.company
.com.tr
Reverse Proxy
C
L
O
U
D
Questions for
Shaping Strategy
 Which services exposed to
whom (3rd parties, external
developers etc..)?
 legal implications?
 metrics to measure success
(page visit or revenue
etc..)?
 aim (increasing the
revenues, increase product
loyalty or rebranding etc..)?
 pricing model (free,
developer pays, shared
revenue, advertisement
revenues, tired pricing etc..)
?
 An effective Web API strategy
is essential in a market where
access really is everything. 1
 Community is important for
success.
 web api management platform place
(inside company or cloud)?
 agrements with incubation centers?

Weitere ähnliche Inhalte

Was ist angesagt?

Data power use cases
Data power use casesData power use cases
Data power use cases
sflynn073
 
Data Power Architectural Patterns - Jagadish Vemugunta
Data Power Architectural Patterns - Jagadish VemuguntaData Power Architectural Patterns - Jagadish Vemugunta
Data Power Architectural Patterns - Jagadish Vemugunta
floridawusergroup
 
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17 IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
Natalia Kataoka
 
Services @ vfm
Services @ vfmServices @ vfm
Services @ vfm
vfmindia
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantage
INSPIRIT BRASIL
 
Summer School Delivering On-Demand Shared Middleware Services
Summer School   Delivering On-Demand Shared Middleware ServicesSummer School   Delivering On-Demand Shared Middleware Services
Summer School Delivering On-Demand Shared Middleware Services
WSO2
 

Was ist angesagt? (20)

Datapowercommonusecases 130509114200-phpapp02
Datapowercommonusecases 130509114200-phpapp02Datapowercommonusecases 130509114200-phpapp02
Datapowercommonusecases 130509114200-phpapp02
 
Data power use cases
Data power use casesData power use cases
Data power use cases
 
IBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway appliances feature & virtual edition comparisonIBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway appliances feature & virtual edition comparison
 
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
 
Data Power Architectural Patterns - Jagadish Vemugunta
Data Power Architectural Patterns - Jagadish VemuguntaData Power Architectural Patterns - Jagadish Vemugunta
Data Power Architectural Patterns - Jagadish Vemugunta
 
WebSphere DataPower B2B Appliance overview
WebSphere DataPower B2B Appliance overviewWebSphere DataPower B2B Appliance overview
WebSphere DataPower B2B Appliance overview
 
DataPower Restful API Security
DataPower Restful API SecurityDataPower Restful API Security
DataPower Restful API Security
 
Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45
 
How to integration DataPower with Zos
How to integration DataPower with ZosHow to integration DataPower with Zos
How to integration DataPower with Zos
 
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17 IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
 
DataPower Security Hardening
DataPower Security HardeningDataPower Security Hardening
DataPower Security Hardening
 
Connecting IBM MessageSight to the Enterprise
Connecting IBM MessageSight to the EnterpriseConnecting IBM MessageSight to the Enterprise
Connecting IBM MessageSight to the Enterprise
 
Services @ vfm
Services @ vfmServices @ vfm
Services @ vfm
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantage
 
Summer School Delivering On-Demand Shared Middleware Services
Summer School   Delivering On-Demand Shared Middleware ServicesSummer School   Delivering On-Demand Shared Middleware Services
Summer School Delivering On-Demand Shared Middleware Services
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 Simplifying User Access with NetScaler SDX and CA Single Sign-on Simplifying User Access with NetScaler SDX and CA Single Sign-on
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 

Andere mochten auch

New technologies in Telco
New technologies in TelcoNew technologies in Telco
New technologies in Telco
Sigortam.net
 
Endeavor Turkey Tech Sector Map
Endeavor Turkey Tech Sector MapEndeavor Turkey Tech Sector Map
Endeavor Turkey Tech Sector Map
bicangels
 
Gateway Networking
Gateway NetworkingGateway Networking
Gateway Networking
Usman Maaz
 

Andere mochten auch (13)

New technologies in Telco
New technologies in TelcoNew technologies in Telco
New technologies in Telco
 
Picture Dictionary
Picture DictionaryPicture Dictionary
Picture Dictionary
 
Porter's strategies (generic strategies, five forces, diamond model) with ref...
Porter's strategies (generic strategies, five forces, diamond model) with ref...Porter's strategies (generic strategies, five forces, diamond model) with ref...
Porter's strategies (generic strategies, five forces, diamond model) with ref...
 
Fast track Incubation of skill sets for big data and game development and web...
Fast track Incubation of skill sets for big data and game development and web...Fast track Incubation of skill sets for big data and game development and web...
Fast track Incubation of skill sets for big data and game development and web...
 
Mobile Inception - Web API Security
Mobile Inception - Web API SecurityMobile Inception - Web API Security
Mobile Inception - Web API Security
 
Web API Security
Web API SecurityWeb API Security
Web API Security
 
Hot trends and how to apply strategies for telecommunication operators
Hot trends and how to apply strategies for telecommunication operatorsHot trends and how to apply strategies for telecommunication operators
Hot trends and how to apply strategies for telecommunication operators
 
End to End Security with MVC and Web API
End to End Security with MVC and Web APIEnd to End Security with MVC and Web API
End to End Security with MVC and Web API
 
Endeavor Turkey Tech Sector Map
Endeavor Turkey Tech Sector MapEndeavor Turkey Tech Sector Map
Endeavor Turkey Tech Sector Map
 
Network gateway
Network gatewayNetwork gateway
Network gateway
 
CA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application SecurityCA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application Security
 
Gateway Networking
Gateway NetworkingGateway Networking
Gateway Networking
 
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2
 

Ähnlich wie Web Api services using IBM Datapower

FS_Usage_Scenarios
FS_Usage_ScenariosFS_Usage_Scenarios
FS_Usage_Scenarios
Kevin Kao
 

Ähnlich wie Web Api services using IBM Datapower (20)

Azure Serrvices Platform Pro Dev Partners
Azure Serrvices Platform Pro Dev PartnersAzure Serrvices Platform Pro Dev Partners
Azure Serrvices Platform Pro Dev Partners
 
Layer 7: Enterprise SOA with SecureSpan and JavaCaps
Layer 7: Enterprise SOA with SecureSpan and JavaCapsLayer 7: Enterprise SOA with SecureSpan and JavaCaps
Layer 7: Enterprise SOA with SecureSpan and JavaCaps
 
Datapower Steven Cawn
Datapower Steven CawnDatapower Steven Cawn
Datapower Steven Cawn
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshop
 
1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architecture1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architecture
 
FS_Usage_Scenarios
FS_Usage_ScenariosFS_Usage_Scenarios
FS_Usage_Scenarios
 
Next-Generation Security Operations with AWS
Next-Generation Security Operations with AWSNext-Generation Security Operations with AWS
Next-Generation Security Operations with AWS
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
 
Cloud security privacy- org
Cloud security  privacy- orgCloud security  privacy- org
Cloud security privacy- org
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Securing Web Application, Services and Servers
Securing Web Application, Services and ServersSecuring Web Application, Services and Servers
Securing Web Application, Services and Servers
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 
Overview of Microsoft Exchange Online
Overview of Microsoft Exchange OnlineOverview of Microsoft Exchange Online
Overview of Microsoft Exchange Online
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 
Layer 7: Managing SOA Security and Operations with SecureSpan
Layer 7: Managing SOA Security and Operations with SecureSpanLayer 7: Managing SOA Security and Operations with SecureSpan
Layer 7: Managing SOA Security and Operations with SecureSpan
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Web Api services using IBM Datapower

  • 1. WEB API Deliver Company Services as Cloud to Developers, 3rd parties etc… Tansu Daslı Osman Ozel
  • 2. DATAPOWER Key Points • Hardened security: It can act purely as a security gateway. • Appliance versatility: It is easy to add to the the network at various points to perform different functions. • XML lingua franca: The promise of XML-speak is uniformity, simplicity, and transparency of handling data. Being XML-centric from core upwards gives DataPower the ability to adapt to different roles. • Any-to-any transformation: The ability to transform any data format allows it to be an integration device. • Multi-protocol support: This allows it to be a integration device or bridge for heritage applications. Ease of Use • Installation: As a network appliance it can be up and running in literally a few minutes. • Development cycle: On-board Web GUI based approach to creating and managing applications gets rid of the develop-deploy round trip development methodology. • Development model: The modeling uses the building-block approach where the application is built using a collection of objects one on top of another. The granularity of these objects maps comfortably to architectural components of typical applications.
  • 3. DataPower Core services Multi-Protocol Gateway Web Service Proxy XML Firewall Web Application Firewall Access to a third-party Web service, described by a WSDL, is front-ended by the Web Service Proxy. Access to a specific operation, is controlled by an Authentication, Authorization, and Auditing Policy (AAA) that extracts identity information from the WS-Security Username-Token. Requests exceeding specified service level parameters are queued and bleed off at the specified rate. Access to all other operations is unrestricted. The XML firewall service is used to send and receive XML traffic over HTTP to and from XML-based applications. • Accept and send SOAP, raw XML, or unprocessed (binary) documents. • Decrypt, encrypt, filter, transform, and validate XML documents. • Route XML documents to the appropriate back-end service. • Sign documents and verify signatures. • Process large documents in the streaming mode. • Implement document-level security or service-level security. • Communicate with clients, servers, and peers with SSL encryption. An external client to connect to the Web application firewall service in DataPower. Once authenticated, request is forwarded to the back-end Web application. The Web application firewall service uses an AAA policy to validate users. In a production environment, you would also need to secure the connection from the Web application firewall service to the back-end Web application, using either a security token or SSL.
  • 4. Web Services & Policy Management Traffic throttling : This is a simplified model of controlling throughput of messages by discarding packets that go over a certain threshold. DataPower’s Limit field sets the threshold, and an interval is set for duration of throttling. Traffic shaping : An SLM that can improve delivery while maintaining SLAs on performance by protecting bandwidth. Custom SLM statements Count all (default) : The threshold level is applied to the resources specified by a resource class. Count errors : The threshold is based on errors. Back-end latency : The threshold is based on server latency. Internal latency : The threshold is based on internal latency (processing time). Total latency : The threshold is based on the sum of measured latencies.
  • 5. Security • Protocol-based security, including SSL • Message-based security, including digital signature generation and verification, as well as data encryption and decryption • The Authentication/Authorization/Audit (AAA) framework for access control • Federated Identity Management WS-Security Security Assertion Markup Language (SAML) XACML PEP/PDP Kerberos and SPNEGO XML threats Multiple-message XDoS attacks Unauthorized access attacks Data integrity/confidentiality attacks Systems compromise attacks Single-message xDOS attacks
  • 6. High Level Architecture operation SOAP WS SOAP WS Datapower cloud domain mw domain Security Throttle Developers 3rd Parties apigee/w2o/mashery/ibm/3scale Security Throttle soap-ws Monitoring Billing Developer Portal HTTP over XML Restfull WS restful-ws D M Z C O M P A N Y Monit oring OTA Developer Portal confluence developer .company .com.tr Reverse Proxy C L O U D
  • 7. Questions for Shaping Strategy  Which services exposed to whom (3rd parties, external developers etc..)?  legal implications?  metrics to measure success (page visit or revenue etc..)?  aim (increasing the revenues, increase product loyalty or rebranding etc..)?  pricing model (free, developer pays, shared revenue, advertisement revenues, tired pricing etc..) ?  An effective Web API strategy is essential in a market where access really is everything. 1  Community is important for success.  web api management platform place (inside company or cloud)?  agrements with incubation centers?

Hinweis der Redaktion

  1. domain based management, different operation groups can use datapowerdomains can be used to isolate the different usage scenariosdatapower capabilities: security (message level, transport level), throttling the load, reverse proxydeveloper portal: service documentations, register api, search api, register user, service usage statistics, how to docs etc…billing: how to bill usages ?
  2. * Source: 1 ftp://public.dhe.ibm.com/software/solutions/soa/pdfs/ebook-web-api-management.pdf