Hi Mark,
Thanks a lot for your help with this. I will take a look at the modules that
you have referenced below.
In our case, Mod-proxy and complementary modules seem to make sense. We need
to hide the location of the real application and the proxy would help with
that. Also the firewall rules i
On September 15, 2011 11:41 , Suneet Shah wrote:
In our architecture, authentication and authorization is handled by a set of
web services. I would need to have the apache module make calls to the
service. I was planning on using Axis 2 for this. Are there any issues with
thiat?
I have no exp