SlideShare a Scribd company logo
1 of 17
Service Oriented Architecture: 17
SOA Governance Reference
Architecture
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
What is SGRM
• The SOA Governance Reference
Model (SGRM) is a generic model that is
utilized as a baseline SOA Governance Model
to expedite the process of tailoring an SOA
Governance Model for an organization.
• All aspects of the SGRM are reviewed and
considered for customization to the
organization’s environment
Constituent parts of SGRM
The SGRM defines a number of constituent parts,
including:
• SOA governance guiding principles
• SOA governing processes
• Governed SOA processes
• SOA governance process artifacts
• SOA governance roles and responsibilities
• SOA governance technology
SOA Governance Guiding Principles
• SOA Governance Guiding Principles assist in the
prioritization and decision-making for the design,
deployment, and execution of the SOA Governance. This
includes aspects of people/roles, processes, and technology.
• The organization’s SOA and governance maturity will affect
how these principles are selected and how strictly they are
applied.
• It is expected that a subset of these principles will be
selected and modified.
SOA Governance
“SOA governance defines the set of policies,
rules and enforcement mechanisms for
developing, using, and evolving service
oriented systems and for analyzing their
business value.”
SOA Governance
• Definition from IBM:
“SOA governance is an extension of IT
governance, which is an extension of corporate
governance.
SOA Governance exercises control of the lifecycle
of services and composite applications in an
organizations SOA”
SOA Governance: Key points
• SOA is about the sharing of services.
• Services must be created and used according to
rules that all of the stake holders can follow.
• Collections of rules are known as policies.
• SOA Governance is about the development and
management of policies.
• Collaborative processes produce and manage
policies.
• This collaborative process may be disruptive.
SOA Governance
• Is meant to resolve issues including:
- which services should be created?
- how should they be created?
- who should have access to these services?
- how will the services be provisioned?
Policies
• Classified into:
(1) Design time policies and
(2) Run time policies
Design Time Policies
• Rules for developers
- Interoperability framework
Require interoperable protocols be used by
services
- Provide incentives to developers
for building proper services and by actually
using existing services rather than ignoring
them.
Run Time Policies
• Lay out the details of service contracts:
Security
Expected Service Levels
Restrictions on service use – authorization
decisions
May be enforced by runtime components
Governance Software
• An SOA Registry – lists services and service
locations.
• An SOA Repository – points to the runtime and
design time policy information associate with
services.
• Oracle offers SOA Governance 11g
• Oracle Web Service Manager can be accessed via
the Enterprise Manager. These policies may be
created and deployed to the OSB.
• EM or OSB may also be used to monitor usage.
Ownership
• Every service has a clearly specified owner.
• Disputes will arise over what functionality the
service will provide.
• These disputes must be resolved.
• Part of SOA governance is to provide a forum
and a means for dispute resolution.
Assignment
• Explain the SOA Governance Reference Model
• Thank You

More Related Content

Similar to Soa 17 soa governance reference architecture

Service Oriented Architecture (SOA) [4/5] : SOA Governance
Service Oriented Architecture (SOA) [4/5] : SOA GovernanceService Oriented Architecture (SOA) [4/5] : SOA Governance
Service Oriented Architecture (SOA) [4/5] : SOA GovernanceIMC Institute
 
2011, A POLICY BASED GOVERNANCE FRAMEWORK FOR CLOUD SERVICE PROCESS ARCHITEC...
2011, A POLICY BASED GOVERNANCE FRAMEWORK FOR  CLOUD SERVICE PROCESS ARCHITEC...2011, A POLICY BASED GOVERNANCE FRAMEWORK FOR  CLOUD SERVICE PROCESS ARCHITEC...
2011, A POLICY BASED GOVERNANCE FRAMEWORK FOR CLOUD SERVICE PROCESS ARCHITEC...MingXue Wang
 
Aws dev ops saif ahmed
Aws dev ops   saif ahmedAws dev ops   saif ahmed
Aws dev ops saif ahmedsaifam
 
04 Service Oriented Architecture Series - SOA Management
04 Service Oriented Architecture Series - SOA Management04 Service Oriented Architecture Series - SOA Management
04 Service Oriented Architecture Series - SOA ManagementPouria Ghatrenabi
 
Lessions Learned - Service Oriented Architecture
Lessions Learned - Service Oriented Architecture Lessions Learned - Service Oriented Architecture
Lessions Learned - Service Oriented Architecture Helge Olav Aarstein
 
Challenges and recommendations to control an SOA operating environment
Challenges and recommendations to control an SOA operating environmentChallenges and recommendations to control an SOA operating environment
Challenges and recommendations to control an SOA operating environmentDav Hol
 
Soa modeling & bpmn
Soa modeling & bpmnSoa modeling & bpmn
Soa modeling & bpmnAyaz Shahid
 
Keys To Successful Governance with SOA
Keys To Successful Governance with SOAKeys To Successful Governance with SOA
Keys To Successful Governance with SOANathaniel Palmer
 
Transformation of the Enterprise to SOA
Transformation of the Enterprise to SOATransformation of the Enterprise to SOA
Transformation of the Enterprise to SOAtom termini
 
10 Steps to Simplify and Improve Service-Oriented Architecture Governance
10 Steps to Simplify and Improve Service-Oriented Architecture Governance10 Steps to Simplify and Improve Service-Oriented Architecture Governance
10 Steps to Simplify and Improve Service-Oriented Architecture GovernancePerficient, Inc.
 
Requirements Engineering Processes
Requirements Engineering ProcessesRequirements Engineering Processes
Requirements Engineering ProcessesRa'Fat Al-Msie'deen
 
Toronix - SOA Governance Quick Start
Toronix - SOA Governance Quick StartToronix - SOA Governance Quick Start
Toronix - SOA Governance Quick Startrrowntree
 
TheServerSide Java Symposium 2005 : Business Rule Management, Enables Agile A...
TheServerSide Java Symposium 2005 : Business Rule Management, Enables Agile A...TheServerSide Java Symposium 2005 : Business Rule Management, Enables Agile A...
TheServerSide Java Symposium 2005 : Business Rule Management, Enables Agile A...Dan Selman
 
Service Management Solution Framework (SMSF)
Service Management Solution Framework (SMSF)Service Management Solution Framework (SMSF)
Service Management Solution Framework (SMSF)Malcolm Ryder
 

Similar to Soa 17 soa governance reference architecture (20)

Service Oriented Architecture (SOA) [4/5] : SOA Governance
Service Oriented Architecture (SOA) [4/5] : SOA GovernanceService Oriented Architecture (SOA) [4/5] : SOA Governance
Service Oriented Architecture (SOA) [4/5] : SOA Governance
 
SOA governance
SOA governanceSOA governance
SOA governance
 
2011, A POLICY BASED GOVERNANCE FRAMEWORK FOR CLOUD SERVICE PROCESS ARCHITEC...
2011, A POLICY BASED GOVERNANCE FRAMEWORK FOR  CLOUD SERVICE PROCESS ARCHITEC...2011, A POLICY BASED GOVERNANCE FRAMEWORK FOR  CLOUD SERVICE PROCESS ARCHITEC...
2011, A POLICY BASED GOVERNANCE FRAMEWORK FOR CLOUD SERVICE PROCESS ARCHITEC...
 
Aws dev ops saif ahmed
Aws dev ops   saif ahmedAws dev ops   saif ahmed
Aws dev ops saif ahmed
 
Soa 15 soa governance
Soa 15 soa governanceSoa 15 soa governance
Soa 15 soa governance
 
04 Service Oriented Architecture Series - SOA Management
04 Service Oriented Architecture Series - SOA Management04 Service Oriented Architecture Series - SOA Management
04 Service Oriented Architecture Series - SOA Management
 
A Guide to SOA Governance | Torry Harris Whitepaper
A Guide to SOA Governance | Torry Harris WhitepaperA Guide to SOA Governance | Torry Harris Whitepaper
A Guide to SOA Governance | Torry Harris Whitepaper
 
Lessions Learned - Service Oriented Architecture
Lessions Learned - Service Oriented Architecture Lessions Learned - Service Oriented Architecture
Lessions Learned - Service Oriented Architecture
 
Challenges and recommendations to control an SOA operating environment
Challenges and recommendations to control an SOA operating environmentChallenges and recommendations to control an SOA operating environment
Challenges and recommendations to control an SOA operating environment
 
Soa modeling & bpmn
Soa modeling & bpmnSoa modeling & bpmn
Soa modeling & bpmn
 
SOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptxSOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptx
 
Keys To Successful Governance with SOA
Keys To Successful Governance with SOAKeys To Successful Governance with SOA
Keys To Successful Governance with SOA
 
Transformation of the Enterprise to SOA
Transformation of the Enterprise to SOATransformation of the Enterprise to SOA
Transformation of the Enterprise to SOA
 
10 Steps to Simplify and Improve Service-Oriented Architecture Governance
10 Steps to Simplify and Improve Service-Oriented Architecture Governance10 Steps to Simplify and Improve Service-Oriented Architecture Governance
10 Steps to Simplify and Improve Service-Oriented Architecture Governance
 
Service oriented architecture 27 May 2014
Service oriented architecture 27 May 2014Service oriented architecture 27 May 2014
Service oriented architecture 27 May 2014
 
Requirements Engineering Processes
Requirements Engineering ProcessesRequirements Engineering Processes
Requirements Engineering Processes
 
Toronix - SOA Governance Quick Start
Toronix - SOA Governance Quick StartToronix - SOA Governance Quick Start
Toronix - SOA Governance Quick Start
 
TheServerSide Java Symposium 2005 : Business Rule Management, Enables Agile A...
TheServerSide Java Symposium 2005 : Business Rule Management, Enables Agile A...TheServerSide Java Symposium 2005 : Business Rule Management, Enables Agile A...
TheServerSide Java Symposium 2005 : Business Rule Management, Enables Agile A...
 
Soa 7 soad elements
Soa 7 soad elementsSoa 7 soad elements
Soa 7 soad elements
 
Service Management Solution Framework (SMSF)
Service Management Solution Framework (SMSF)Service Management Solution Framework (SMSF)
Service Management Solution Framework (SMSF)
 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applicationsVaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmVaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standardVaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesVaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeVaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication codeVaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmVaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmVaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationVaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremVaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primalityVaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsVaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbersVaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmVaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfishVaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple desVaibhav Khanna
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...WSO2
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationJuha-Pekka Tolvanen
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2
 
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next IntegrationWSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next IntegrationWSO2
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2
 
Evolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI EraEvolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI Eraconfluent
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 
WSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2
 

Recently uploaded (20)

WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
 
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next IntegrationWSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
 
Evolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI EraEvolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI Era
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
WSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - Kanchana
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
 

Soa 17 soa governance reference architecture

  • 1. Service Oriented Architecture: 17 SOA Governance Reference Architecture Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. What is SGRM • The SOA Governance Reference Model (SGRM) is a generic model that is utilized as a baseline SOA Governance Model to expedite the process of tailoring an SOA Governance Model for an organization. • All aspects of the SGRM are reviewed and considered for customization to the organization’s environment
  • 3. Constituent parts of SGRM The SGRM defines a number of constituent parts, including: • SOA governance guiding principles • SOA governing processes • Governed SOA processes • SOA governance process artifacts • SOA governance roles and responsibilities • SOA governance technology
  • 4. SOA Governance Guiding Principles • SOA Governance Guiding Principles assist in the prioritization and decision-making for the design, deployment, and execution of the SOA Governance. This includes aspects of people/roles, processes, and technology. • The organization’s SOA and governance maturity will affect how these principles are selected and how strictly they are applied. • It is expected that a subset of these principles will be selected and modified.
  • 5. SOA Governance “SOA governance defines the set of policies, rules and enforcement mechanisms for developing, using, and evolving service oriented systems and for analyzing their business value.”
  • 6. SOA Governance • Definition from IBM: “SOA governance is an extension of IT governance, which is an extension of corporate governance. SOA Governance exercises control of the lifecycle of services and composite applications in an organizations SOA”
  • 7. SOA Governance: Key points • SOA is about the sharing of services. • Services must be created and used according to rules that all of the stake holders can follow. • Collections of rules are known as policies. • SOA Governance is about the development and management of policies. • Collaborative processes produce and manage policies. • This collaborative process may be disruptive.
  • 8. SOA Governance • Is meant to resolve issues including: - which services should be created? - how should they be created? - who should have access to these services? - how will the services be provisioned?
  • 9.
  • 10. Policies • Classified into: (1) Design time policies and (2) Run time policies
  • 11. Design Time Policies • Rules for developers - Interoperability framework Require interoperable protocols be used by services - Provide incentives to developers for building proper services and by actually using existing services rather than ignoring them.
  • 12.
  • 13. Run Time Policies • Lay out the details of service contracts: Security Expected Service Levels Restrictions on service use – authorization decisions May be enforced by runtime components
  • 14.
  • 15. Governance Software • An SOA Registry – lists services and service locations. • An SOA Repository – points to the runtime and design time policy information associate with services. • Oracle offers SOA Governance 11g • Oracle Web Service Manager can be accessed via the Enterprise Manager. These policies may be created and deployed to the OSB. • EM or OSB may also be used to monitor usage.
  • 16. Ownership • Every service has a clearly specified owner. • Disputes will arise over what functionality the service will provide. • These disputes must be resolved. • Part of SOA governance is to provide a forum and a means for dispute resolution.
  • 17. Assignment • Explain the SOA Governance Reference Model • Thank You