Training in ITAC WS-Guardian® management

..................................................................................................................................................................................................


ITAC WS-Guardian® is a SOA security and run-time governance platform that enables both highly flexible customization and enforcement of security policies and an integrated SOA life-cycle management. It empowers any business's SOA architecture by enabling its fast, organized, secure and sustainable growth with both highly flexible customization and enforcement of security policies for services consumption without constant recoding to application components.

The ITAC WS-Guardian® Management course provides the knowledge necessary for managing and administer ITAC WS-Guardian® efficiently, taking advantage of the technical and functional features of the solution for the SOA platforms security and governance.

 

  SYLLABUSS        

  1. Needs and Risks of SOA Security

..........................................................................................................................

  2. Current SOA standards

..........................................................................................................................

  3. SOA Governance

..........................................................................................................................

  4. KeyStore Management

ITAC WS-Guardian® Security Keys
Import Keys
Download public key
CA Requests and Responses
Partner's public keys

..........................................................................................................................

  5. WS-Security Policies

UserNameToken
TimeStamp
XML (Encryption/Decryption)
XML Signature

..........................................................................................................................

  6. Message and message source policy

HTTP headers and HTTP authentication
Working hours and weekdays management

..........................................................................................................................

  7. Services in other protocols security

¿What are services in other protocols?
Applicable policies

..........................................................................................................................

  8. Conditional policies

Use, configuration and usage scenarios
Policies based on IP addresses
Policies based on XML content
Policies based on HTTP Headers

..........................................................................................................................

  9. Advanced Management

Users management
LDAP integration
WSDL cache
Backups
Users, roles and permissions
Global and run-time options
Language, global policies and others
Registry maintenance

..........................................................................................................................

  10. Reports

Audit
Management
Web Services
Services in other protocols
Association of Policies to Services
Services monitoring

..........................................................................................................................

  11. Use Cases and Scenarios

Best practices
Scenarios
MZ
DMZ
Active – Active
Active - Passive


 

 

 

 

 

 

© Copyright 2018. ITAC. / Diseño y Producción Sitio Web : ITAC : www.itac.co / Todos los derechos reservados. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.