List of Figures
- 1-1 Security Provided by OWSM Agents
- 1-2 Components of OWSM Architecture
- 2-1 OWSM Keystore Configuration for Message Protection
- 2-2 STS Token Exchange
- 2-3 Masking Sensitive Data
- 2-4 Fine-Grained Authorization
- 2-5 Coarse-Grained Authorization
- 2-6 PII Encryption in Oracle Service Bus
- 2-7 Single SOA Composite Use Case
- 2-8 JCA Adapter PII Use Case
- 3-1 OWSM Policy Framework Leverages OPSS and Oracle WebLogic Server Security
- 3-2 OWSM Agent and Policy Manager Interaction
- 3-3 Policy Containing Assertions
- 3-4 Example Policy With Two Assertions
- 3-5 Policy Interceptors Acting on Messages Between a Client and Web Service (SOAP)
- 3-6 Identifying the Different Parts of a Policy Name