yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Computing
Conference & Expo
November 2-4, 2009 NYC
Register Today and SAVE !..

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...
Modernizing Axis1 Services Painlessly
Migrating with WSAS

Managing the Service on WSAS
Go back to your list of service, but this time click on the bid link under services. This should bring up the interface shown in Figure 7. There’s a lot you can do here, but for now let’s click on the Manage Module Engagements link. That should bring up the interface shown in Figure 8.

The various modules in the Module combo box represent Axis2 modules that implement various WS-*. Let’s say we’re interested in WS-Security. To enable this, we simply pick rampart from the list, as shown in Figure 9. Click the Engage button, and just like that WSAS will activate its WS-Security module for your service, as shown in Figure 10. Similarly, you can pick sandesha from the Module list and WSAS will enable WS-Reliable Messaging for your service. Let’s take a look at some of the security options we have available to us.

Security Configuration
Let’s go back to our Service listing (Figure 7) and this time click the Security Configuration link. This will bring up the interface shown in Figure 11. What is this list you see here? This list represents 11 different pre-set security configurations included with WSAS. These 11 configurations represent the most common scenarios for securing a Web Service. Whatever your security requirements are, it’s probably covered by one of them. Enabling any of them is trivial, just pick its radio button and continue. For example, let’s say we pick the “Sign and encrypt - TripleDES/RSA15 – DK” option then we’ll bring up the interface shown in Figure 12.

Notice that WSAS already has both a trusted certificate store and a keystore location provided to support encryption. The Management Console has a Keystore tab (on the left) that you can use to manage certificates and providers. Once you apply the security configuration, you can go back to the list of services and click on the Policy, as shown in Figure 13.

This will bring up the Policy, shown in Listing 3. The Policy is an extensible way to configure any/all of the WS-* technologies you have enabled for your service. Where did this Policy come from? It was generated by WSAS for you when you selected the Security Configuration. You can still manually edit this file either to tweak security or to configure your WS-Reliable Messaging policy.

In this article we’ve started with an Axis service, and very easily redeployed it to WSAS. All we needed was its WSDD deployment descriptor and a JAR of all its classes. We saw how WSAS made sure to maintain backwards compatibility with the original service, even though the original service used the deprecated RPC-encoding format. Once we brought our service into WSAS, we could easily enable WS-Security and WS-Reliable Messaging. Finally, WSAS made it especially easy to pick a powerful Security Configuration, automatically managing the Policy for us.


About Michael Galpin
Michael Galpin is an architect at eBay, specializing in presentation technologies. He has been hacking on the web since the 90s, is a frequent writer for IBM developerWorks, and has a degree in mathematics from Caltech.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

SOA World Latest Stories
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes ...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand usin...
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and sy...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portabil...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is founda...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder an...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers
Most Read This Week