
Security System Guide: Table of Contents
xviii
Chapter 16 How to Use Reliable Messaging Function for Web Services (SOAP)
PUSH Model (Receiving Messages by the Server System).........................................................16-2
Preparing a Key Pair and Public Key Used by the Receiver Server.......................................16-2
Deploying the Receiver Application.........................................................................................16-3
Preparing a Key Pair and Public Key Used by the Sender Client ...........................................16-6
Deploying the Sender Application............................................................................................16-6
PULL Model (Receiving Messages by the Client System) ...........................................................16-9
Preparing a Key Pair and Public Key Used by the Sender Server..........................................16-9
Deploying the Sender Application......................................................................................... 16-10
Preparing a Key Pair and Public Key Used by the Receiver Client...................................... 16-12
Deploying the Receiver Application...................................................................................... 16-12
Chapter 17 How to use SSL with the ebXML Message Service
Chapter 18 How to use XML Digital Signature with ebXML Message Service
Appendix A Enhancing Security (Protecting Interstage Resources)
Protecting Interstage Resources....................................................................................................A-2
Environment Setup for Interstage Resources Protection ..............................................................A-4
CORBA Service ........................................................................................................................A-4
Component Transaction Service...............................................................................................A-9
Generating an Extended System.......................................................................................A-10
Generating an Interstage System Definition File...............................................................A-10
Registering the Interstage System Definition File..............................................................A-10
Initializing Interstage..........................................................................................................A-10
Executing the Security-Enhancing Environment Setup Command...................................A-10
Notes.................................................................................................................................. A-11
Database Linkage Service......................................................................................................A-15
EJB Service.............................................................................................................................A-16
Environment Construction Just After Installation...............................................................A-16
Environment Construction After Constructing an Environment for EJB Service Job
Operation (Default System Only).......................................................................................A-17
Environment Construction After Constructing an Environment for EJB Job Operation (Multi-
System)..............................................................................................................................A-17
EJB Service Operation ......................................................................................................A-18
Details of the ejbchangemode Command .........................................................................A-19
Details of the Output Messages.........................................................................................A-21
Interstage JMS........................................................................................................................A-25
Environment Construction .................................................................................................A-25
Notes..................................................................................................................................A-28
Interstage Operation Tool........................................................................................................A-28
Kommentare zu diesen Handbüchern