You are on page 1of 17

Mediator 11g Overview

Prepared by:
Jagjeet Singh Kalra

1 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 16
Agenda
a) SOA 11g Introduction
b) SOA Composite Application Architecture
c) Mediators
d) Web service security
e) Examples

2 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 16
Goal of SOA

3 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 16
What is Oracle SOA Suite?
•Oracle SOA Suite 11g is a member of the Oracle Fusion Middleware family
of products.

•It provides a complete set of service infrastructure components for


designing, deploying, and managing SOA applications.

•Oracle SOA Suite enables services to be created, managed, and


orchestrated into composite applications and business processes.

• Composites enable you to easily assemble multiple technology


components into one SOA composite application.

4 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 16
Oracle SOA Suite Standards
Oracle SOA Suite puts a strong emphasis on standards and interoperability. Among
the standards it leverages are:
The Service Component Architecture (SCA) assembly model abstracts the implementation and allows
assembly of components, with little implementation details. SCA enables you to represent business logic as
reusable service components that can be easily integrated into any SCA-compliant application. The resulting
application is known as a SOA composite application.
Business Process Execution Language (BPEL) provides enterprises with an industry standard for
business process orchestration and execution. Using BPEL, you design a business process that integrates a
series of discrete services into an end-to-end process flow.

XSL Transformations (XSLT) processes XML documents and transforms document data from one XML
schema to another.
Java Connector Architecture (JCA) provides a Java technology solution to the problem of connectivity
between the many application servers in Enterprise Information Systems (EIS).
Java Messaging Service (JMS) provides a messaging standard that allows application components based
on the Java Enterprise Edition (JEE) to access business logic distributed among heterogeneous systems.
Web Service Description Language (WSDL) file provides a standardized view on the capabilities of a
service. Bindings provide the entry points into the composite at runtime.
SOAP over HTTP (SOAP) provides the default network protocol for message delivery.

5 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 16
Oracle SOA Suite Service components
Service components (BPEL process, business rule, human task, spring, and
mediator) are the building blocks that you use to construct a SOA composite
application.
Service engines for the components process the message information received from
the Service Infrastructure.

6 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 16
SOA Composite Application Architecture
A SOA composite is an assembly of services, service components, and references
designed and deployed together in a single application. Wiring between the service,
service component, and reference enable message communication. The composite
processes the information described in the messages.

Service Components
Service components are the building blocks of a SOA composite application. Each service
component is hosted in its own service engine container. Messages sent to the service engine
are targeted at specific service components.

7 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 16
SOA Composite Application Architecture
Services
Services provide the outside world with an entry point to the SOA composite application. The
WSDL file of the service advertises its capabilities to external applications. These capabilities
are used for contacting the SOA composite application components. The binding connectivity
of the service describes the protocols that can communicate with the service, for example,
SOAP/HTTP or a JCA adapter.

References
References enable messages to be sent from the SOA composite application to external
services in the outside world.

Wires
Wires enable you to graphically connect the following components in a single SOA composite
application for message communication:
Services to service components
Service components to other service components
Service components to reference

8 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 16
Mediator
Oracle Mediator is a service component of the Oracle SOA Suite that
provides mediation capabilities such as:
selective routing, transformation, validation capabilities, along with various
message exchange patterns.

Oracle Mediator provides a lightweight framework to mediate between


various components within a composite application.

Oracle Mediator converts data to facilitate communication between different


interfaces exposed by different components that are wired to build a SOA
composite application.

9 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 16
Mediator features
• Content-Based and Header-Based Routing
• Synchronous and Asynchronous Interactions
• Sequential and Parallel Routing of Messages
• Transformations
• Validations
• Java Callouts
• Event Handling
• Dynamic Routing
• Error Handling
• Echo

10 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 16
Demo Example

11 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 16
Web service Security
To secure web service security you need to configure one or both type of
security:

Transport level Security: It allows the client and web service to


communicate securely across the network by providing secure connection.
SSL is most widely used transport level data-communication protocol. SSL
provides:
Authentication - communication between two trusted parties.
confidentiality - data exchange is encrypted.
Message integrity – data is checked for possible corruption.

Limitations:
Point to point
Cannot encrypt selected part of message

12 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 16
Web service Security
Message level security: Message level security is end to end security, It
means that message is secured throughout its journey between the sender
and the intended recipient
Confidentiality: By encrypting message parts
Integrity: by digital signatures
Authentication, by requiring username, X.509 or SAML tokens.

Secured data is built into the XML message part, usually as additional
SOAP header fields.

13 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 16
Web service Security
Sample username tokens:

<wsse:UsernameToken>
<wsse:Username>abc</wsse:Username>
<wsse:Password>welcome1<wsse:Password>
</wsse:UsernameToken>

14 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 16
Oracle Web Services Manager (OWSM) Policy
OWSM is a security and management system that provides a common
security infrastructure for web services application.

You can attach OWSM Policies to SOA, ADF and Webcenter Web services.

You can manage OWSM Policies from Oracle EM console and from
command line using WLST custom commands.

OWSM is installed by default when you install OFMW SOA Suite.

15 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 16
Demo Example

16 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 16
Thank You

17 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 16

You might also like