Go to main content
3/11
List of Figures
1-1 Security Provided by OWSM Agents
1-2 Components of OWSM Architecture
2-1 OWSM Keystore Configuration for Message Protection
2-2 STS Token Exchange
2-3 Masking Sensitive Data
2-4 Fine-Grained Authorization
2-5 Coarse-Grained Authorization
2-6 PII Encryption in Oracle Service Bus
2-7 Single SOA Composite Use Case
2-8 JCA Adapter PII Use Case
3-1 OWSM Policy Framework Leverages OPSS and Oracle WebLogic Server Security
3-2 OWSM Agent and Policy Manager Interaction
3-3 Policy Containing Assertions
3-4 Example Policy With Two Assertions
3-5 Policy Interceptors Acting on Messages Between a Client and Web Service (SOAP)
3-6 Identifying the Different Parts of a Policy Name
Scripting on this page enhances content navigation, but does not change the content in any way.