>> externalize most of the effort. They even make it relatively simple
>> to integrate with legacy systems that implement proprietary authN
>> and authZ schemes.
>
> I may be misunderstanding but I've yet to see a successful security
> infrastructure that worked through centralization/externalization
> into a set of products save for a few trivial cases.
I agree. I mean, I think I disagree that XML gateways move "most of
the effort" out of the business logic per se, neither does it become
"relatively simple". XML gateways do "in transit" kinds of things,
i.e. they can translate, route, wrap, and unwrap. That can be
difficult in itself. There is still a need for security, identity,
roles, etc. in the business logic per se that requires a good bit of
effort.
-Patrick
SPONSORED LINKS
| Computer software | Computer aided design software | Computer job |
| Soa | Service-oriented architecture |
YAHOO! GROUPS LINKS
- Visit your group "service-orientated-architecture" on the web.
- To unsubscribe from this group, send an email to:
[EMAIL PROTECTED]
- Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service.
