scalability, 6-10
automated application integration and, 6
of integration hub environment, 8-9
Schedule capability, 99-100
scheduling services, 79
schema definition, 103, 81
example of, 104
forms of, 103
schema recognition, 105
schemas
checking, 105
definition. See schema definition
preloading from standards organizations, 103
recognition, 105
validating, 105
screen scraping, 12
secret key encryption, vs. public key, 60
Security Context Management capability, 118
security context management, 59, 92, 118
security policy, 53-55
components to include, 54
creating, 54
referencing other documents in, 55
security, 53-61
audit log, 66
authentication. See authentication
authorization. See authorization
capabilities, 117-121
capabilities provided by Microsoft technologies, 90
capabilities required for, 55
communication plan, creating, 54
context management. See security context management
data access log, 66
encryption. See encryption
guidelines, creating, 54
logs, ensuring security of, 66
monitoring, 66
policy. See security policy
requirements, defining, 55-56
risk analysis, 56
threat classification/ management, 54
token-based, 58
of Web services. See Web Services Security specification
semantic mapping, 106
semi-automated application integration, 4. See also automated application integration
combining with fully automated application integration, 6
cost/benefit analysis, 5
efficiency of, 4
serialization/deserialization, 114
service state, 99
SharePoint Portal Server SSO system, 91
SharePoint, 75
simulating human interface with applications, 12
single casting, 113
single sign-on (SSO), 91
SOAP requests, receiving/ delivering, 72
SQL Server 2000, 71-72
Analysis Services, 71-72, 93
Data Transformation Services, 71
SSO system, 91
staged data access, 109
State Management capability, 98-99
state management, 78, 98-99
storing messages in queues, 46-47, 73, 113
straight-through processing (STP), 30-33
business processing capabilities used in, 31
communications capabilities used in, 32-33
vs. composed applications, 41
cost/benefit analysis, 31
Data Access capability, 32
data capabilities used in, 32
example of, 31
indirect access to applications, enabling, 32
Message Forwarding capability, 32
Serialization/Deserialization capability, 33
Transactional Delivery capability, 33
structure
centralized. See integration hub environment
decentralized. See point-to-point environment
style sheets, XSLT, 73
subscription directory, 126-127
synchronizing data. See data synchronization
synchronous communication
vs. asynchronous communication, 28
capabilities required for, 29
composed applications and, 43
system breakdowns, and fully automated application integration, 6
system configuration snapshot, 125
system health, 64. See also system monitoring
system monitoring, 63-66, 121
application health monitoring, 63-65
baselining, 121-122
data aggregation and, 63
performance monitoring, 65
probing tests, 63-64
security monitoring, 66
system health monitoring, 63-65
system-level authorization, 57