Copyright © Cloud Software Group, Inc. All Rights Reserved
Copyright © Cloud Software Group, Inc. All Rights Reserved


Figures

Figures
Figure 1 Functional Overview
Figure 2 Functional Components
Figure 3 Single Server Deployment
Figure 4 Deployment of Multiple Components in Distributed Environment
Figure 5 Apache HTTP Server in DMZ and Other Components in Secure Network
Figure 6 Rendezvous Transport Communication
Figure 7 Secure Deployment with Rendezvous
Figure 8 LDAP Server Properties Sample File:
Figure 9 Sample Property File for File Authentication
Figure 10 RoundRobin Routing
Figure 11 Weighted RoundRobin
Figure 12 StickyResourceAffinity Routing Algorithm
Figure 13 RoundRobin Target Operation Group Configuration
Figure 14 WeightedRoundRobin Target Operation Group Configuration
Figure 15 RoundRobinWithFailOver Target Operation Group
Figure 16 WeightedRoundRobinWithFailOver Target Operation Group
Figure 17 StickyResourceAffinity Target Operation Group Configuration
Figure 18 Throttle Types
Figure 19 Security Enforcement EndPoints
Figure 20 Authentication Policies
Figure 21 Authorization Policies
Figure 22 Sign Policy
Figure 23 VerifySignature Policy
Figure 24 Encryption Policy
Figure 25 Decrypt Policy
Figure 26 CredentialMapping Policies
Figure 27 OAuth Server Overview
Figure 28 Interactions Between Components
Figure 29 Owner SPI Flow
Figure 30 Client SPI Flow
Figure 31 Scope SPI Flow
Figure 32 Central Logger Database Schema
Figure 33 Overview of Runtime components For High Availability
Figure 34 Deployment of Runtime Components In a Cluster

Copyright © Cloud Software Group, Inc. All Rights Reserved
Copyright © Cloud Software Group, Inc. All Rights Reserved