On Thu, Aug 9, 2012 at 8:19 PM, binhnt22 <[email protected]> wrote:
> Thank you very much, Lresende**** > > ** ** > > One more question about security, if you don’t mind.**** > > ** ** > > As I said before, the legacy systems communicate through a central > database with encrypted hibernate.cfg.xml and a good network policy.**** > > ** ** > > But pairing with Tuscany, most of the communication points will be exposed > through web service (intranet). And I think that’s a problem.**** > > ** ** > > Can you share some knowledge? How those systems talk to each other in a > well-defense environment? Prevent anyone without the authorization from > accessing those web services.**** > > ** ** > > *Best regards* > > Binh, Nguyen Thanh**** > > Cell phone: (+84)982260622**** > > ** ** > > > It seems that what you want is to provide some control on who can access the Tuscany services. You could handled that in few different ways, simply configuring authorization in the web application server for the service endpoint or more towards a SCA solution, you could create a Security Policy which would be attached to your services and prevent access of unauthorized users but that would require you to do some development on the infrastructure side. -- Luciano Resende http://people.apache.org/~lresende http://twitter.com/lresende1975 http://lresende.blogspot.com/
