Index_S


S

scalability, 6-10

automated application integration and, 6

of integration hub environment, 8-9

Schedule capability, 99-100

scheduling services, 79

schema definition, 103, 81

example of, 104

forms of, 103

schema recognition, 105

schemas

checking, 105

definition. See schema definition

preloading from standards organizations, 103

recognition, 105

validating, 105

screen scraping, 12

secret key encryption, vs. public key, 60

Security Context Management capability, 118

security context management, 59, 92, 118

security policy, 53-55

components to include, 54

creating, 54

referencing other documents in, 55

security, 53-61

audit log, 66

authentication. See authentication

authorization. See authorization

capabilities, 117-121

capabilities provided by Microsoft technologies, 90

capabilities required for, 55

communication plan, creating, 54

context management. See security context management

data access log, 66

encryption. See encryption

guidelines, creating, 54

logs, ensuring security of, 66

monitoring, 66

policy. See security policy

requirements, defining, 55-56

risk analysis, 56

threat classification/ management, 54

token-based, 58

of Web services. See Web Services Security specification

semantic mapping, 106

semi-automated application integration, 4. See also automated application integration

combining with fully automated application integration, 6

cost/benefit analysis, 5

efficiency of, 4

serialization/deserialization, 114

service state, 99

SharePoint Portal Server SSO system, 91

SharePoint, 75

simulating human interface with applications, 12

single casting, 113

single sign-on (SSO), 91

SOAP requests, receiving/ delivering, 72

SQL Server 2000, 71-72

Analysis Services, 71-72, 93

Data Transformation Services, 71

SSO system, 91

staged data access, 109

State Management capability, 98-99

state management, 78, 98-99

storing messages in queues, 46-47, 73, 113

straight-through processing (STP), 30-33

business processing capabilities used in, 31

communications capabilities used in, 32-33

vs. composed applications, 41

cost/benefit analysis, 31

Data Access capability, 32

data capabilities used in, 32

example of, 31

indirect access to applications, enabling, 32

Message Forwarding capability, 32

Serialization/Deserialization capability, 33

Transactional Delivery capability, 33

structure

centralized. See integration hub environment

decentralized. See point-to-point environment

style sheets, XSLT, 73

subscription directory, 126-127

synchronizing data. See data synchronization

synchronous communication

vs. asynchronous communication, 28

capabilities required for, 29

composed applications and, 43

system breakdowns, and fully automated application integration, 6

system configuration snapshot, 125

system health, 64. See also system monitoring

system monitoring, 63-66, 121

application health monitoring, 63-65

baselining, 121-122

data aggregation and, 63

performance monitoring, 65

probing tests, 63-64

security monitoring, 66

system health monitoring, 63-65

system-level authorization, 57




Microsoft Corporation - Guidelines for Application Integration
Microsoft Corporation - Guidelines for Application Integration
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 50

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net