Deploying WebLogic Integration Solutions

     Previous  Next    Contents  Open Index in new window  View as PDF - New Window  Get Adobe Reader - New Window
Content starts here

Introduction

Deployment Goals

Key Deployment Tasks

Roles in Integration Solution Deployment

Deployment Specialists

WebLogic Server Administrators

Database Administrators

Key Deployment Resources

WebLogic Server Resources

Clustering

Java Message Service

EJB Pooling and Caching

JDBC Connection Pools

Execution Thread Pool

J2EE Connector Architecture

Process Application Resources

Process Control Resources

Message Broker Resources

Event Generator Resources

JMS Generator

File, Email, and Timer Event Generators

MQSeries and HTTP Event Generators

RDBMS Event Generator

Suspending Event Generators

Trading Partner Integration Resources

Trading Partner Management Repository

Trading Partner Integration Initialization and Run-Time Operations

Relational Database Management System Resources

Hardware, Operating System, and Network Resources

Deployment Plans

Configuring a Single-Server Deployment

Step 1. Configure a Database

Step 2. Prepare the WLI Domain

Step 3. Configure WebLogic Integration Security

Step 4. Start and Monitor the Server

Starting the Server

Monitoring and Shutting Down Your Server

Step 5. Deploy a WLI Application

Understanding WebLogic Integration Clusters

Understanding WLI Clusters

Designing a Clustered Deployment

Introducing WLI Domains

Deploying WLI Resources

Load Balancing in a WLI Cluster

Load Balancing HTTP Functions in a Cluster

Load Balancing JMS Functions in a Cluster

Deploying Applications

Deploying Event Generators

Email, File, and Timer Event Generators

JMS Event Generator

MQSeries Event Generator

HTTP Event Generator

RDBMS Event Generator

Configuring a Clustered Deployment

Step 1. Comply with Configuration Prerequisites

Step 2. Prepare the WLI Domain

Editing Domain Configuration Files

Adding Proxy Server or Firewall Information to Domain Configuration

Step 3. Configure WebLogic Integration Security

Step 4. Start and Monitor the Managed Servers in the Domain

Starting the Managed Servers

Monitoring and Shutting Down Your Servers

Step 5. Deploy a WLI Application

Understanding WebLogic Integration High Availability

About WebLogic Integration High Availability

Recommended Hardware and Software

Regarding JMS File Stores

What Happens When a Server Fails

Software Faults

Hardware Faults

Server Migration

Failure and Recovery: Trading Partner Integration

RosettaNet

ebXML

Using WebLogic Integration Security

Overview of WebLogic Integration Security

Security and WebLogic Integration Domains

WebLogic Integration PasswordStore for Encrypted Passwords

Keystore for Private Keys and Certificates

Types of Keystores

Default Keystores for the Test Environment

Keystores in a Production Environment

WebLogic Server Security Principals and Resources Used in WLI

Considerations for Configuring Security

About Digital Certificates

Digital Certificate Formats

Using the Secure Sockets Layer (SSL) Protocol

Using an Outbound Proxy Server or Proxy Plug-In

Using an Outbound Proxy Server

Using a Web Server with the WebLogic Proxy Plug-In

Using a Firewall

Setting Up a Secure Deployment

Step 1: Create the Domain

Step 2: Configure WebLogic Server Security

Step 3: Configure Web Application and Web Service Security-Related Deployment Descriptors

Step 4: Configure Security Policies and Manage Users

Configuring Security Policies for Business Processes

Configuring Security Policies for Message Broker Channels

Managing Production Users

Step 5: Configure Worklist Security

Step 6: Configure Trading Partner Integration Security

wli-config.properties Configuration File

WebLogic Integration Deployment Resources


  Back to Top       Previous  Next