DocumentCode :
2917431
Title :
Automated deployment and Aggregated access control for SOA composite applications
Author :
Poddar, Indrajit ; Goldszmidt, G.
Author_Institution :
IBM, Pittsburgh, PA
fYear :
2007
fDate :
May 21 2007-Yearly 25 2007
Firstpage :
833
Lastpage :
847
Abstract :
Modeling, assembling, deploying and managing composite applications built using service oriented architectures (SOA) present many interesting challenges. Among these challenges, we consider two: service deployment and security management for access control. In this application session, these challenges are explored in the context of a prototype banking application: "Jivaro". The Jivaro prototype has features such as automated and configurable business processes using BPEL and manual tasks, multitenancy using virtual portals, and security using LDAP. We focus on two specific management pain points: 1. the difficulty in deploying multiple SOA components into multiple target middleware containers, and 2. inconsistency in access control policies for multi-tier applications. For addressing the deployment issues, we present a real-wo rid deployment scenario involving the use of ANT tasks and scripting interfaces. For addressing inconsistencies in access control policies, we present a solution using the XACML standard, a common authorization model developed as an extension of the Java authorization contract for containers and a common policy store and policy administration point. We compare and contrast current access control policies for J2EE containers and databases with the proposed new common authorization model. We also compare separate access control policy stores versus the proposed solution for a common store. Our aggregated role based authorization model provides consistent access control policies that complement single sign-on and identity propagation schemes. This model also touches upon issues surrounding role and policy based management, specifically regarding the potential of combining security policy administrator roles for different tiers.
Keywords :
Java; authorisation; middleware; software architecture; BPEL; J2EE containers; Java authorization contract; Jivaro prototype; SOA composite applications; XACML standard; aggregated access control; multiple target middleware containers; security management; service deployment; service oriented architectures; virtual portals; Access control; Assembly; Authorization; Banking; Containers; Prototypes; Security; Semiconductor optical amplifiers; Service oriented architecture; Virtual prototyping; Integration and middleware technologies for management; Security management Policy and role based management; Service Onented Architecture and management; service deployment;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Integrated Network Management, 2007. IM '07. 10th IFIP/IEEE International Symposium on
Conference_Location :
Munich
Print_ISBN :
1-4244-0798-2
Electronic_ISBN :
1-4244-0799-0
Type :
conf
DOI :
10.1109/INM.2007.374725
Filename :
4258616
Link To Document :
بازگشت