Calling the Service from a SOA Application
The security requirements of a particular scenario will determine:
- the policy sets and intents that need to be added to the calling SOA application to enforce authentication.
- how and where those policy sets and intents should be configured.
- whether the SOA application invokes the service exposed by the BPM process using a virtualization binding or a SOAP binding.
The following sections provide three high-level examples of how authentication can be enforced:
Example 1 - Single Sign-on Using a Virtualization Binding
Copyright © Cloud Software Group, Inc. All rights reserved.