Skip navigation.

User Guide

   Previous Next vertical dots separating previous/next from contents/index/pdf Contents View as PDF   Get Adobe Reader

Introduction

Modeling Message Flow in AquaLogic Service Bus

About AquaLogic Service Bus Message Flow

Building a Message Flow

Message Execution

Pipelines

Branching in Message Flows

Operational Branching

Conditional Branching

Performing Transformations

Configuring Single or Multiple Stages in Pipelines

Using Multiple Stages

Handling Errors

Generating the Error Message, Reporting, and Replying

Example

Selecting a Service Type

Use a WSDL to Define a Service

Choosing a WSDL Port or Binding?

Any SOAP or Any XML Service Types

Messaging Service Type

Dynamic Routing

Message Context

Key Context Manipulation Facts

Copying JMS Properties From Inbound to Outbound

RPC and Document Style SOAP

RPC Web Services

Document Style SOAP

Variable Structures

Quality of Service

Delivery Guarantees

Outbound Message Retries

Content Types, JMS Type, and Encoding

Asynchronous Request/Response

JMS Correlation ID

WS-I Compliance

WS-I Compliance Checks

Securing Inbound and Outbound Messages

AquaLogic Service Bus Security FAQ

About AquaLogic Service Bus Security

WebLogic Server Prerequisites

Main Steps for Securing AquaLogic Service Bus Domains

Details and Options for Securing AquaLogic Service Bus Domains

Transport-Level Security

HTTPS Transport-Level Security

Inbound HTTPS Transport-Level Security

Outbound HTTPS Transport-Level Security

HTTP Transport-Level Security

Security for JMS, Email, FTP, and File Transport

JMS Transport-Level Security

Email and FTP Transport-Level Security

File Transport Security

Transport-Level Security in Message Flow and Service Callout Actions

Message-Level Security (Web Services Security)

About Web Services Security

Inbound Web Services Security

About Inbound Web Services Security

Client Request and Proxy Service Response

How to Configure a WS-Security Pass-Through Scenario

How to Configure an Active Intermediary WS-Security Proxy Service

Outbound Web Services Security

About Outbound Web Services Security

How to Configure Outbound Web Services Security

Disabling Outbound WS-Security in the Pipeline

Web Service Policy

About Web Service Policy

Web Services Policy Attachment

Effective Policy

Out-of-the-Box WS-Policy Statements

SAML Support

Identity Propagation

Pass-Through Identity Propagation

SAML Credential Mapping

Inbound Authentication with a SAML WS-Security Token

Troubleshooting SAML Web Services Security

Access Control

About Access Control

Users

Groups

Security Roles

Role-Based Access in AquaLogic Service Bus Console

Credentials

Service Accounts

Proxy Service Providers

Configuring Credentials

Configuring Proxy Service Access Control

Securing AquaLogic Service Bus for a Production Environment

Using the Test Console

Features

Prerequisites

Testing Proxy Services

Direct Calls

Indirect Calls

HTTP Requests

Testing Business Services

Transport Security

Recommended Approaches to Testing Proxy and Business Services

Tracing Proxy Services Using the Test Console

Example: Testing and Tracing a Proxy Service

Testing Resources

MFL

Example

XSLT

XQuery

Performing In-line XQuery Testing

Testing Services With Web Service Security

Test Console Transport Settings

Monitoring

Monitoring Scenarios

About Monitoring

Aggregation Interval

Monitoring Architecture

Monitoring Services

Refresh Rate of Monitored Information

Dashboard

Service Summary

About the Service Summary

Service Monitoring Summary

Service Monitoring Details

Server Summary

About the Server Summary

Log Summary

Server Summary

Server Details

Alert Summary

About the Alert Summary

System Alerts History

System Alert Details

View Alert Rule Details

Alert Rules

About Alert Rules

Some Uses for Alerts

Understanding Alert Rules

Reporting

Reporting Scenarios

Reporting Framework

JMS Reporting Provider

About the JMS Reporting Provider

How to Enable Message Reporting

Using the Reporting Module

Summary of Messages

View Message Details

Purging Messages

Configuring a Database for the JMS Reporting Provider Store

Configuring a Database in a Development Environment

Configuring a Database for Production

Removing, Stopping, or Untargeting a Reporting Provider

Stopping a Reporting Provider when the Server is Running

Untargeting a Reporting Provider when the Server is Running

Untargeting the JMS Reporting Provider—Server Not Running

Tracing

UDDI

Overview of BEA AquaLogic Service Bus and UDDI

Basic Concepts of the UDDI Specification

Benefits of Using a UDDI Registry with AquaLogic Service Bus

Introduction to UDDI Entities

Prerequisites

Certification

Features

What is the BEA AquaLogic Service Registry?

Sample Business Scenario for AquaLogic Service Bus and UDDI

Cross-Domain Deployment in AquaLogic Service Bus

Using AquaLogic Service Bus and UDDI

Typical Workflow

Configuring a Registry

Publishing a Proxy Service to a UDDI Registry

Importing a Service from a Registry

Mapping AquaLogic Service Bus Proxy Services to UDDI Entities

UDDI Mapping Details for an AquaLogic Service Bus Proxy Service

Transport Attributes

Service Type Attributes

Canonical tModels Supporting AquaLogic Service Bus Services

Example

Tuning AquaLogic Service Bus

Debugging AquaLogic Service Bus

XQuery Implementation

 

Skip footer navigation  Back to Top Previous Next