SlideShare a Scribd company logo
1 of 12
Service Oriented Architecture: 20
Steps to SOA Governance
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
7 Steps to SOA
1. Create/Expose Services
2. Register Services
3. Secure Services
4. Manage (monitor) Services
5. Mediate and Virtualize Services
6. Govern the SOA
7. Integrate Services
1. Create & Expose Services
• Three primary choices
– Rebuild existing applications using SOA paradigm
– Expose existing application logic as a set of services
– A combination of rebuild and expose
• Enterprises typically use a combination of rebuild & expose
– Solutions exist that facilitate migration of mainframe
applications such as CICS to Web Services
• Granularity is a key criterion for Web Service
– Functionality must be sufficiently coarse-grained
– If coarse-grained, potential to be useful to different
applications
2. Register Services
• Application architects & developers need to know that a
service exists
• Use a registry
– UDDI compatibility important
– Search and Browse capability
– Facilitate quick and accurate discovery of services
– Some vendors have extended registries to repositories
3. Secure Services
• 5 principles of security
1. Authentication
• Basic HTTP authentication, SAML, X.509 signature
2. Authorization
• Leverage solutions such as CA SiteMinder, IBM TAM
3. Privacy
• XML-Encryption
• Key & certificate management & distribution capabilities
4. Non-Repudiation
• Requestor & Sender cannot deny activities
5. Auditing
• Accurate accounting of requests & responses
4. Manage Services
• Look for potential disaster
– Too many applications consuming a service?
– Is the load reasonable
– Is there a degradation in performance?
• Need to be able to monitor for
– Basic Availability
– Performance
– Throughput
– SLA agreement
5. Mediate & Virtualize Services
• As SOA matures may need to:
– Introduce new versions
– Increase capacity by running multiple instances
– Provision applications to use specific instances of
services
• Solution is Virtualization
– Virtual service is a new service
• Own WSDL, network address, transport parameters
• Doesn’t implement business logic
• Acts as proxy to one or more physical services
• Routes, load-balances, transforms, mediates
• XML transformation can be used to allow consumers to use
an old version of service that no longer exists
– Request & response transformed
Mediate & Virtualize Services Cont’d
• Consumers can select specific operations from multiple
different services & combine them into a single functional
WSDL
• Consumers can provide different policy requirements for
different classes of users
• Transport bridging can be provided
– E.g. HTTP and JMS
• Meditation between different standards implementation or
versions of standards
• Mediation between different messaging styles
– RSS, SOAP, REST, Plain old XML (POX)
• Content-or-context-based routing to deliver advanced load-
balancing and high-availability capabilities
6. Govern the SOA
• Use a governance framework
• Design Time Issues
– What types of services can be published?
– Who can publish them?
– What types of schema and messages services can
accept?
– What are the rules for the services?
• Run Time Issues
– Security
– Reliability
– Performance
– Compliance with policies
Govern the SOA Cont’d
• Tools needed for active participants
• Service Developer needs tools to:
– Publish, categorize, define meta-data, virtualize
– Choose policy, participate in capacity planning & access
workflow
• Service Consumer needs tools to:
– Facilitate service discovery, selection & access workflow
• Operations Staff need to:
– Monitor service performance
– Troubleshoot problems, monitor dependencies
– Version services, virtualization & proxy management
Govern the SOA Cont’d
• Security Staff needs tools to:
– Manage policy, report policy, check compliance, audit
security
• Enterprise Architect needs tools to:
– Monitor application, manage relationships
– Define & validate design policy
– Assign services to proxy
– Virtualize services
• Enterprise IT Management
– Manage reuse metrics
– Gather service reuse statistics
– Gather SOA statistics
Assignment
• Explain the Steps to SOA Governance and
implementation
• Thank You

More Related Content

What's hot

Software Evolution: From Legacy Systems, Service Oriented Architecture to Clo...
Software Evolution: From Legacy Systems, Service Oriented Architecture to Clo...Software Evolution: From Legacy Systems, Service Oriented Architecture to Clo...
Software Evolution: From Legacy Systems, Service Oriented Architecture to Clo...PET Computação
 
Introduction to the All New WSO2 Governance Centre
Introduction to the All New WSO2 Governance CentreIntroduction to the All New WSO2 Governance Centre
Introduction to the All New WSO2 Governance CentreSagara Gunathunga
 
Empowering Development Governance with WSO2 Products
Empowering Development Governance with WSO2 ProductsEmpowering Development Governance with WSO2 Products
Empowering Development Governance with WSO2 ProductsWSO2
 
Introduction to REST
Introduction to RESTIntroduction to REST
Introduction to RESTkumar gaurav
 
Addressing Security Concerns with WSO2 Governance Registry Policy Store
Addressing Security Concerns with WSO2 Governance Registry Policy StoreAddressing Security Concerns with WSO2 Governance Registry Policy Store
Addressing Security Concerns with WSO2 Governance Registry Policy StoreWSO2
 
SOA Governance
SOA GovernanceSOA Governance
SOA GovernanceWSO2
 
SOA Governance Strategies
SOA Governance StrategiesSOA Governance Strategies
SOA Governance StrategiesWSO2
 
APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?Akana
 
WSO2Con 2016: Breaking Down Silos with Service Oriented Architecture
WSO2Con 2016: Breaking Down Silos with Service Oriented ArchitectureWSO2Con 2016: Breaking Down Silos with Service Oriented Architecture
WSO2Con 2016: Breaking Down Silos with Service Oriented ArchitectureWSO2
 
The Next Frontier of Spiceworks’ Product Roadmap - Greg & Tabrez
The Next Frontier of Spiceworks’ Product Roadmap - Greg & TabrezThe Next Frontier of Spiceworks’ Product Roadmap - Greg & Tabrez
The Next Frontier of Spiceworks’ Product Roadmap - Greg & TabrezSpiceworks
 
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...Spiceworks
 
Exploring a Real World Use Case
Exploring a Real World Use CaseExploring a Real World Use Case
Exploring a Real World Use CaseWSO2
 
WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...
WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...
WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...WSO2
 
Managing ESB artifacts with the WSO2 Governance Registry
Managing ESB artifacts with the WSO2 Governance Registry Managing ESB artifacts with the WSO2 Governance Registry
Managing ESB artifacts with the WSO2 Governance Registry WSO2
 
Rxt demo-part3
Rxt demo-part3Rxt demo-part3
Rxt demo-part3WSO2
 
Quality - The key to successful SOA
Quality - The key to successful SOAQuality - The key to successful SOA
Quality - The key to successful SOAWSO2
 

What's hot (20)

Software Evolution: From Legacy Systems, Service Oriented Architecture to Clo...
Software Evolution: From Legacy Systems, Service Oriented Architecture to Clo...Software Evolution: From Legacy Systems, Service Oriented Architecture to Clo...
Software Evolution: From Legacy Systems, Service Oriented Architecture to Clo...
 
Presentation1 soa
Presentation1 soaPresentation1 soa
Presentation1 soa
 
Introduction to the All New WSO2 Governance Centre
Introduction to the All New WSO2 Governance CentreIntroduction to the All New WSO2 Governance Centre
Introduction to the All New WSO2 Governance Centre
 
Empowering Development Governance with WSO2 Products
Empowering Development Governance with WSO2 ProductsEmpowering Development Governance with WSO2 Products
Empowering Development Governance with WSO2 Products
 
Introduction to REST
Introduction to RESTIntroduction to REST
Introduction to REST
 
Addressing Security Concerns with WSO2 Governance Registry Policy Store
Addressing Security Concerns with WSO2 Governance Registry Policy StoreAddressing Security Concerns with WSO2 Governance Registry Policy Store
Addressing Security Concerns with WSO2 Governance Registry Policy Store
 
SOA Governance
SOA GovernanceSOA Governance
SOA Governance
 
SOA Governance Strategies
SOA Governance StrategiesSOA Governance Strategies
SOA Governance Strategies
 
APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?
 
SOA governance
SOA governanceSOA governance
SOA governance
 
WSO2Con 2016: Breaking Down Silos with Service Oriented Architecture
WSO2Con 2016: Breaking Down Silos with Service Oriented ArchitectureWSO2Con 2016: Breaking Down Silos with Service Oriented Architecture
WSO2Con 2016: Breaking Down Silos with Service Oriented Architecture
 
The Next Frontier of Spiceworks’ Product Roadmap - Greg & Tabrez
The Next Frontier of Spiceworks’ Product Roadmap - Greg & TabrezThe Next Frontier of Spiceworks’ Product Roadmap - Greg & Tabrez
The Next Frontier of Spiceworks’ Product Roadmap - Greg & Tabrez
 
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
 
Web Services and OGSA
Web Services and OGSAWeb Services and OGSA
Web Services and OGSA
 
Exploring a Real World Use Case
Exploring a Real World Use CaseExploring a Real World Use Case
Exploring a Real World Use Case
 
WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...
WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...
WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...
 
Managing ESB artifacts with the WSO2 Governance Registry
Managing ESB artifacts with the WSO2 Governance Registry Managing ESB artifacts with the WSO2 Governance Registry
Managing ESB artifacts with the WSO2 Governance Registry
 
Rxt demo-part3
Rxt demo-part3Rxt demo-part3
Rxt demo-part3
 
Soa Eai Ver1 0
Soa Eai Ver1 0Soa Eai Ver1 0
Soa Eai Ver1 0
 
Quality - The key to successful SOA
Quality - The key to successful SOAQuality - The key to successful SOA
Quality - The key to successful SOA
 

Similar to Soa 20 steps to soa governance

SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURESOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTUREAnyaForger34
 
Lessions Learned - Service Oriented Architecture
Lessions Learned - Service Oriented Architecture Lessions Learned - Service Oriented Architecture
Lessions Learned - Service Oriented Architecture Helge Olav Aarstein
 
The Evolution of Architecture
The Evolution of ArchitectureThe Evolution of Architecture
The Evolution of ArchitectureNVISIA
 
Establishing SOA Focused Enterprise Architecture
Establishing SOA Focused Enterprise ArchitectureEstablishing SOA Focused Enterprise Architecture
Establishing SOA Focused Enterprise ArchitectureChris Haddad
 
API’s and Micro Services 0.5
API’s and Micro Services 0.5API’s and Micro Services 0.5
API’s and Micro Services 0.5Richard Hudson
 
Streamline your SOA Portfolio
Streamline your SOA Portfolio Streamline your SOA Portfolio
Streamline your SOA Portfolio WSO2
 
Practical soa for business and researchers
Practical soa for business and researchersPractical soa for business and researchers
Practical soa for business and researchersMustafa Gamal
 
Promoting Service Reuse within your Organization and Encouraging-SOA Success
Promoting Service Reuse within your Organization and Encouraging-SOA SuccessPromoting Service Reuse within your Organization and Encouraging-SOA Success
Promoting Service Reuse within your Organization and Encouraging-SOA SuccessWSO2
 
Introduction to PaaS
Introduction to PaaSIntroduction to PaaS
Introduction to PaaSChris Haddad
 
Tokyo Azure Meetup #5 - Microservices and Azure Service Fabric
Tokyo Azure Meetup #5 - Microservices and Azure Service FabricTokyo Azure Meetup #5 - Microservices and Azure Service Fabric
Tokyo Azure Meetup #5 - Microservices and Azure Service FabricTokyo Azure Meetup
 
SOA - Unit 1 - Introduction to SOA with Web Services
SOA - Unit   1 - Introduction to SOA with Web ServicesSOA - Unit   1 - Introduction to SOA with Web Services
SOA - Unit 1 - Introduction to SOA with Web Serviceshamsa nandhini
 
Service design principles and patterns
Service design principles and patternsService design principles and patterns
Service design principles and patternsReturn on Intelligence
 
WSO2 and Agile Path - How the WSO2 Governance Registry is being used for a k...
 WSO2 and Agile Path - How the WSO2 Governance Registry is being used for a k... WSO2 and Agile Path - How the WSO2 Governance Registry is being used for a k...
WSO2 and Agile Path - How the WSO2 Governance Registry is being used for a k...WSO2
 
Service Oriented Architecture (SOA) [4/5] : SOA Governance
Service Oriented Architecture (SOA) [4/5] : SOA GovernanceService Oriented Architecture (SOA) [4/5] : SOA Governance
Service Oriented Architecture (SOA) [4/5] : SOA GovernanceIMC Institute
 
Semantic web service
Semantic web serviceSemantic web service
Semantic web servicejean Agnimel
 

Similar to Soa 20 steps to soa governance (20)

SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURESOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
 
Service oriented architecture 27 May 2014
Service oriented architecture 27 May 2014Service oriented architecture 27 May 2014
Service oriented architecture 27 May 2014
 
Lessions Learned - Service Oriented Architecture
Lessions Learned - Service Oriented Architecture Lessions Learned - Service Oriented Architecture
Lessions Learned - Service Oriented Architecture
 
The Evolution of Architecture
The Evolution of ArchitectureThe Evolution of Architecture
The Evolution of Architecture
 
Forecast odcau5 100_ak2
Forecast odcau5 100_ak2Forecast odcau5 100_ak2
Forecast odcau5 100_ak2
 
Soa 15 soa governance
Soa 15 soa governanceSoa 15 soa governance
Soa 15 soa governance
 
Establishing SOA Focused Enterprise Architecture
Establishing SOA Focused Enterprise ArchitectureEstablishing SOA Focused Enterprise Architecture
Establishing SOA Focused Enterprise Architecture
 
API’s and Micro Services 0.5
API’s and Micro Services 0.5API’s and Micro Services 0.5
API’s and Micro Services 0.5
 
Streamline your SOA Portfolio
Streamline your SOA Portfolio Streamline your SOA Portfolio
Streamline your SOA Portfolio
 
Practical soa for business and researchers
Practical soa for business and researchersPractical soa for business and researchers
Practical soa for business and researchers
 
SOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptxSOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptx
 
Promoting Service Reuse within your Organization and Encouraging-SOA Success
Promoting Service Reuse within your Organization and Encouraging-SOA SuccessPromoting Service Reuse within your Organization and Encouraging-SOA Success
Promoting Service Reuse within your Organization and Encouraging-SOA Success
 
Introduction to PaaS
Introduction to PaaSIntroduction to PaaS
Introduction to PaaS
 
Tokyo Azure Meetup #5 - Microservices and Azure Service Fabric
Tokyo Azure Meetup #5 - Microservices and Azure Service FabricTokyo Azure Meetup #5 - Microservices and Azure Service Fabric
Tokyo Azure Meetup #5 - Microservices and Azure Service Fabric
 
From SOA to MSA
From SOA to MSAFrom SOA to MSA
From SOA to MSA
 
SOA - Unit 1 - Introduction to SOA with Web Services
SOA - Unit   1 - Introduction to SOA with Web ServicesSOA - Unit   1 - Introduction to SOA with Web Services
SOA - Unit 1 - Introduction to SOA with Web Services
 
Service design principles and patterns
Service design principles and patternsService design principles and patterns
Service design principles and patterns
 
WSO2 and Agile Path - How the WSO2 Governance Registry is being used for a k...
 WSO2 and Agile Path - How the WSO2 Governance Registry is being used for a k... WSO2 and Agile Path - How the WSO2 Governance Registry is being used for a k...
WSO2 and Agile Path - How the WSO2 Governance Registry is being used for a k...
 
Service Oriented Architecture (SOA) [4/5] : SOA Governance
Service Oriented Architecture (SOA) [4/5] : SOA GovernanceService Oriented Architecture (SOA) [4/5] : SOA Governance
Service Oriented Architecture (SOA) [4/5] : SOA Governance
 
Semantic web service
Semantic web serviceSemantic web service
Semantic web service
 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applicationsVaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmVaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standardVaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesVaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeVaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication codeVaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmVaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmVaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationVaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremVaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primalityVaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsVaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbersVaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmVaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfishVaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple desVaibhav Khanna
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 

Soa 20 steps to soa governance

  • 1. Service Oriented Architecture: 20 Steps to SOA Governance Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. 7 Steps to SOA 1. Create/Expose Services 2. Register Services 3. Secure Services 4. Manage (monitor) Services 5. Mediate and Virtualize Services 6. Govern the SOA 7. Integrate Services
  • 3. 1. Create & Expose Services • Three primary choices – Rebuild existing applications using SOA paradigm – Expose existing application logic as a set of services – A combination of rebuild and expose • Enterprises typically use a combination of rebuild & expose – Solutions exist that facilitate migration of mainframe applications such as CICS to Web Services • Granularity is a key criterion for Web Service – Functionality must be sufficiently coarse-grained – If coarse-grained, potential to be useful to different applications
  • 4. 2. Register Services • Application architects & developers need to know that a service exists • Use a registry – UDDI compatibility important – Search and Browse capability – Facilitate quick and accurate discovery of services – Some vendors have extended registries to repositories
  • 5. 3. Secure Services • 5 principles of security 1. Authentication • Basic HTTP authentication, SAML, X.509 signature 2. Authorization • Leverage solutions such as CA SiteMinder, IBM TAM 3. Privacy • XML-Encryption • Key & certificate management & distribution capabilities 4. Non-Repudiation • Requestor & Sender cannot deny activities 5. Auditing • Accurate accounting of requests & responses
  • 6. 4. Manage Services • Look for potential disaster – Too many applications consuming a service? – Is the load reasonable – Is there a degradation in performance? • Need to be able to monitor for – Basic Availability – Performance – Throughput – SLA agreement
  • 7. 5. Mediate & Virtualize Services • As SOA matures may need to: – Introduce new versions – Increase capacity by running multiple instances – Provision applications to use specific instances of services • Solution is Virtualization – Virtual service is a new service • Own WSDL, network address, transport parameters • Doesn’t implement business logic • Acts as proxy to one or more physical services • Routes, load-balances, transforms, mediates • XML transformation can be used to allow consumers to use an old version of service that no longer exists – Request & response transformed
  • 8. Mediate & Virtualize Services Cont’d • Consumers can select specific operations from multiple different services & combine them into a single functional WSDL • Consumers can provide different policy requirements for different classes of users • Transport bridging can be provided – E.g. HTTP and JMS • Meditation between different standards implementation or versions of standards • Mediation between different messaging styles – RSS, SOAP, REST, Plain old XML (POX) • Content-or-context-based routing to deliver advanced load- balancing and high-availability capabilities
  • 9. 6. Govern the SOA • Use a governance framework • Design Time Issues – What types of services can be published? – Who can publish them? – What types of schema and messages services can accept? – What are the rules for the services? • Run Time Issues – Security – Reliability – Performance – Compliance with policies
  • 10. Govern the SOA Cont’d • Tools needed for active participants • Service Developer needs tools to: – Publish, categorize, define meta-data, virtualize – Choose policy, participate in capacity planning & access workflow • Service Consumer needs tools to: – Facilitate service discovery, selection & access workflow • Operations Staff need to: – Monitor service performance – Troubleshoot problems, monitor dependencies – Version services, virtualization & proxy management
  • 11. Govern the SOA Cont’d • Security Staff needs tools to: – Manage policy, report policy, check compliance, audit security • Enterprise Architect needs tools to: – Monitor application, manage relationships – Define & validate design policy – Assign services to proxy – Virtualize services • Enterprise IT Management – Manage reuse metrics – Gather service reuse statistics – Gather SOA statistics
  • 12. Assignment • Explain the Steps to SOA Governance and implementation • Thank You