SlideShare a Scribd company logo
WEB API
Deliver Company Services as Cloud to
Developers, 3rd parties etc…
Tansu Daslı
Osman Ozel
DATAPOWER
Key Points
• Hardened security: It can act purely
as a security gateway.
• Appliance versatility: It is easy to add
to the the network at various points to
perform different functions.
• XML lingua franca: The promise of
XML-speak is uniformity, simplicity, and
transparency of handling data. Being
XML-centric from core upwards gives
DataPower the ability to adapt to
different roles.
• Any-to-any transformation: The ability
to transform any data format allows it
to be an integration device.
• Multi-protocol support: This allows it to
be a integration device or bridge for
heritage applications.
Ease of Use
• Installation: As a network appliance it
can be up and running in literally a
few minutes.
• Development cycle: On-board Web
GUI based approach to creating and
managing applications gets rid of the
develop-deploy round trip
development methodology.
• Development model: The modeling
uses the building-block approach
where the application is built using a
collection of objects one on top of
another. The granularity of these
objects maps comfortably to
architectural components of typical
applications.
DataPower
Core services
Multi-Protocol Gateway
Web Service Proxy
XML Firewall
Web Application Firewall
Access to a third-party Web service, described by a
WSDL, is front-ended by the Web Service Proxy.
Access to a specific operation, is controlled by an
Authentication, Authorization, and Auditing Policy (AAA)
that extracts identity information from the WS-Security
Username-Token. Requests exceeding specified service
level parameters are queued and bleed off at the
specified rate. Access to all other operations is
unrestricted.
The XML firewall service is used to send and receive XML
traffic over HTTP to and from XML-based applications.
• Accept and send SOAP, raw XML, or unprocessed (binary)
documents.
• Decrypt, encrypt, filter, transform, and validate XML
documents.
• Route XML documents to the appropriate back-end service.
• Sign documents and verify signatures.
• Process large documents in the streaming mode.
• Implement document-level security or service-level security.
• Communicate with clients, servers, and peers with SSL
encryption.
An external client to connect to the Web application firewall service in
DataPower. Once authenticated, request is forwarded to the back-end
Web application.
The Web application firewall service uses an AAA policy to validate users. In
a production environment, you would also need to secure the connection
from the Web application firewall service to the back-end Web application,
using either a security token or SSL.
Web Services &
Policy Management
Traffic throttling : This is a simplified model of controlling throughput of messages by discarding
packets that go over a certain threshold. DataPower’s Limit field sets the threshold, and an
interval is set for duration of throttling.
Traffic shaping : An SLM that can improve delivery while maintaining SLAs on performance by
protecting bandwidth.
Custom SLM statements
Count all (default) : The threshold level is applied to the resources specified by a resource class.
Count errors : The threshold is based on errors.
Back-end latency : The threshold is based on server latency.
Internal latency : The threshold is based on internal latency (processing time).
Total latency : The threshold is based on the sum of measured latencies.
Security
• Protocol-based security, including SSL
• Message-based security, including digital signature generation and
verification, as well as data encryption and decryption
• The Authentication/Authorization/Audit (AAA) framework for access control
• Federated Identity Management
WS-Security
Security Assertion Markup Language (SAML)
XACML PEP/PDP
Kerberos and SPNEGO
XML threats
Multiple-message XDoS attacks
Unauthorized access attacks
Data integrity/confidentiality attacks
Systems compromise attacks
Single-message xDOS attacks
High Level Architecture
operation
SOAP
WS
SOAP
WS
Datapower
cloud domain mw domain
Security
Throttle
Developers
3rd Parties
apigee/w2o/mashery/ibm/3scale
Security
Throttle
soap-ws
Monitoring
Billing
Developer Portal
HTTP
over
XML
Restfull
WS
restful-ws
D
M
Z
C
O
M
P
A
N
Y
Monit
oring
OTA
Developer Portal
confluence
developer
.company
.com.tr
Reverse Proxy
C
L
O
U
D
Questions for
Shaping Strategy
 Which services exposed to
whom (3rd parties, external
developers etc..)?
 legal implications?
 metrics to measure success
(page visit or revenue
etc..)?
 aim (increasing the
revenues, increase product
loyalty or rebranding etc..)?
 pricing model (free,
developer pays, shared
revenue, advertisement
revenues, tired pricing etc..)
?
 An effective Web API strategy
is essential in a market where
access really is everything. 1
 Community is important for
success.
 web api management platform place
(inside company or cloud)?
 agrements with incubation centers?
Ad

More Related Content

What's hot (20)

Datapowercommonusecases 130509114200-phpapp02
Datapowercommonusecases 130509114200-phpapp02Datapowercommonusecases 130509114200-phpapp02
Datapowercommonusecases 130509114200-phpapp02
Cristina Garrido Lema
 
Data power use cases
Data power use casesData power use cases
Data power use cases
sflynn073
 
IBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway appliances feature & virtual edition comparisonIBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway
 
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
Rui Santos
 
Data Power Architectural Patterns - Jagadish Vemugunta
Data Power Architectural Patterns - Jagadish VemuguntaData Power Architectural Patterns - Jagadish Vemugunta
Data Power Architectural Patterns - Jagadish Vemugunta
floridawusergroup
 
WebSphere DataPower B2B Appliance overview
WebSphere DataPower B2B Appliance overviewWebSphere DataPower B2B Appliance overview
WebSphere DataPower B2B Appliance overview
Sarah Duffy
 
DataPower Restful API Security
DataPower Restful API SecurityDataPower Restful API Security
DataPower Restful API Security
Jagadish Vemugunta
 
Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45
Sarah Duffy
 
How to integration DataPower with Zos
How to integration DataPower with ZosHow to integration DataPower with Zos
How to integration DataPower with Zos
Shiu-Fun Poon
 
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17 IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
Natalia Kataoka
 
DataPower Security Hardening
DataPower Security HardeningDataPower Security Hardening
DataPower Security Hardening
Shiu-Fun Poon
 
Connecting IBM MessageSight to the Enterprise
Connecting IBM MessageSight to the EnterpriseConnecting IBM MessageSight to the Enterprise
Connecting IBM MessageSight to the Enterprise
Andrew Schofield
 
Services @ vfm
Services @ vfmServices @ vfm
Services @ vfm
vfmindia
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
SafeNet
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantage
INSPIRIT BRASIL
 
Summer School Delivering On-Demand Shared Middleware Services
Summer School   Delivering On-Demand Shared Middleware ServicesSummer School   Delivering On-Demand Shared Middleware Services
Summer School Delivering On-Demand Shared Middleware Services
WSO2
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
BAKOTECH
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
PROIDEA
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
AEC Networks
 
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 Simplifying User Access with NetScaler SDX and CA Single Sign-on Simplifying User Access with NetScaler SDX and CA Single Sign-on
Simplifying User Access with NetScaler SDX and CA Single Sign-on
CA Technologies
 
Datapowercommonusecases 130509114200-phpapp02
Datapowercommonusecases 130509114200-phpapp02Datapowercommonusecases 130509114200-phpapp02
Datapowercommonusecases 130509114200-phpapp02
Cristina Garrido Lema
 
Data power use cases
Data power use casesData power use cases
Data power use cases
sflynn073
 
IBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway appliances feature & virtual edition comparisonIBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway
 
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
Rui Santos
 
Data Power Architectural Patterns - Jagadish Vemugunta
Data Power Architectural Patterns - Jagadish VemuguntaData Power Architectural Patterns - Jagadish Vemugunta
Data Power Architectural Patterns - Jagadish Vemugunta
floridawusergroup
 
WebSphere DataPower B2B Appliance overview
WebSphere DataPower B2B Appliance overviewWebSphere DataPower B2B Appliance overview
WebSphere DataPower B2B Appliance overview
Sarah Duffy
 
DataPower Restful API Security
DataPower Restful API SecurityDataPower Restful API Security
DataPower Restful API Security
Jagadish Vemugunta
 
Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45
Sarah Duffy
 
How to integration DataPower with Zos
How to integration DataPower with ZosHow to integration DataPower with Zos
How to integration DataPower with Zos
Shiu-Fun Poon
 
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17 IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
Natalia Kataoka
 
DataPower Security Hardening
DataPower Security HardeningDataPower Security Hardening
DataPower Security Hardening
Shiu-Fun Poon
 
Connecting IBM MessageSight to the Enterprise
Connecting IBM MessageSight to the EnterpriseConnecting IBM MessageSight to the Enterprise
Connecting IBM MessageSight to the Enterprise
Andrew Schofield
 
Services @ vfm
Services @ vfmServices @ vfm
Services @ vfm
vfmindia
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
SafeNet
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantage
INSPIRIT BRASIL
 
Summer School Delivering On-Demand Shared Middleware Services
Summer School   Delivering On-Demand Shared Middleware ServicesSummer School   Delivering On-Demand Shared Middleware Services
Summer School Delivering On-Demand Shared Middleware Services
WSO2
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
BAKOTECH
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
PROIDEA
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
AEC Networks
 
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 Simplifying User Access with NetScaler SDX and CA Single Sign-on Simplifying User Access with NetScaler SDX and CA Single Sign-on
Simplifying User Access with NetScaler SDX and CA Single Sign-on
CA Technologies
 

Viewers also liked (13)

New technologies in Telco
New technologies in TelcoNew technologies in Telco
New technologies in Telco
Sigortam.net
 
Picture Dictionary
Picture DictionaryPicture Dictionary
Picture Dictionary
Sigortam.net
 
Porter's strategies (generic strategies, five forces, diamond model) with ref...
Porter's strategies (generic strategies, five forces, diamond model) with ref...Porter's strategies (generic strategies, five forces, diamond model) with ref...
Porter's strategies (generic strategies, five forces, diamond model) with ref...
Sigortam.net
 
Fast track Incubation of skill sets for big data and game development and web...
Fast track Incubation of skill sets for big data and game development and web...Fast track Incubation of skill sets for big data and game development and web...
Fast track Incubation of skill sets for big data and game development and web...
Sigortam.net
 
Mobile Inception - Web API Security
Mobile Inception - Web API SecurityMobile Inception - Web API Security
Mobile Inception - Web API Security
MobileInception
 
Web API Security
Web API SecurityWeb API Security
Web API Security
Stefaan
 
Hot trends and how to apply strategies for telecommunication operators
Hot trends and how to apply strategies for telecommunication operatorsHot trends and how to apply strategies for telecommunication operators
Hot trends and how to apply strategies for telecommunication operators
Sigortam.net
 
End to End Security with MVC and Web API
End to End Security with MVC and Web APIEnd to End Security with MVC and Web API
End to End Security with MVC and Web API
Michele Leroux Bustamante
 
Endeavor Turkey Tech Sector Map
Endeavor Turkey Tech Sector MapEndeavor Turkey Tech Sector Map
Endeavor Turkey Tech Sector Map
bicangels
 
Network gateway
Network gatewayNetwork gateway
Network gateway
Marek Novák
 
CA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application SecurityCA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application Security
CA Technologies
 
Gateway Networking
Gateway NetworkingGateway Networking
Gateway Networking
Usman Maaz
 
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateway
 
New technologies in Telco
New technologies in TelcoNew technologies in Telco
New technologies in Telco
Sigortam.net
 
Picture Dictionary
Picture DictionaryPicture Dictionary
Picture Dictionary
Sigortam.net
 
Porter's strategies (generic strategies, five forces, diamond model) with ref...
Porter's strategies (generic strategies, five forces, diamond model) with ref...Porter's strategies (generic strategies, five forces, diamond model) with ref...
Porter's strategies (generic strategies, five forces, diamond model) with ref...
Sigortam.net
 
Fast track Incubation of skill sets for big data and game development and web...
Fast track Incubation of skill sets for big data and game development and web...Fast track Incubation of skill sets for big data and game development and web...
Fast track Incubation of skill sets for big data and game development and web...
Sigortam.net
 
Mobile Inception - Web API Security
Mobile Inception - Web API SecurityMobile Inception - Web API Security
Mobile Inception - Web API Security
MobileInception
 
Web API Security
Web API SecurityWeb API Security
Web API Security
Stefaan
 
Hot trends and how to apply strategies for telecommunication operators
Hot trends and how to apply strategies for telecommunication operatorsHot trends and how to apply strategies for telecommunication operators
Hot trends and how to apply strategies for telecommunication operators
Sigortam.net
 
Endeavor Turkey Tech Sector Map
Endeavor Turkey Tech Sector MapEndeavor Turkey Tech Sector Map
Endeavor Turkey Tech Sector Map
bicangels
 
CA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application SecurityCA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application Security
CA Technologies
 
Gateway Networking
Gateway NetworkingGateway Networking
Gateway Networking
Usman Maaz
 
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateway
 
Ad

Similar to Web Api services using IBM Datapower (20)

Azure Serrvices Platform Pro Dev Partners
Azure Serrvices Platform Pro Dev PartnersAzure Serrvices Platform Pro Dev Partners
Azure Serrvices Platform Pro Dev Partners
John Stame
 
Layer 7: Enterprise SOA with SecureSpan and JavaCaps
Layer 7: Enterprise SOA with SecureSpan and JavaCapsLayer 7: Enterprise SOA with SecureSpan and JavaCaps
Layer 7: Enterprise SOA with SecureSpan and JavaCaps
CA API Management
 
Datapower Steven Cawn
Datapower Steven CawnDatapower Steven Cawn
Datapower Steven Cawn
Valeri Illescas
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...
kanimozhin
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshop
kanimozhin
 
1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architecture1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architecture
Cloud Genius
 
FS_Usage_Scenarios
FS_Usage_ScenariosFS_Usage_Scenarios
FS_Usage_Scenarios
Kevin Kao
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
European Collaboration Summit
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
TrongMinhHoang1
 
Cloud security privacy- org
Cloud security  privacy- orgCloud security  privacy- org
Cloud security privacy- org
Dharmalingam S
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Securing Web Application, Services and Servers
Securing Web Application, Services and ServersSecuring Web Application, Services and Servers
Securing Web Application, Services and Servers
Dr.S.Jagadeesh Kumar
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
Security Innovation
 
Overview of Microsoft Exchange Online
Overview of Microsoft Exchange OnlineOverview of Microsoft Exchange Online
Overview of Microsoft Exchange Online
Microsoft Private Cloud
 
Layer 7: Managing SOA Security and Operations with SecureSpan
Layer 7: Managing SOA Security and Operations with SecureSpanLayer 7: Managing SOA Security and Operations with SecureSpan
Layer 7: Managing SOA Security and Operations with SecureSpan
CA API Management
 
Zimbra Overview
Zimbra OverviewZimbra Overview
Zimbra Overview
Suministros Obras y Sistemas
 
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
Teguh Febrianto Setiawan
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
Sangfor Technologies USA
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
MuhammadSajidAbdulga
 
Azure Serrvices Platform Pro Dev Partners
Azure Serrvices Platform Pro Dev PartnersAzure Serrvices Platform Pro Dev Partners
Azure Serrvices Platform Pro Dev Partners
John Stame
 
Layer 7: Enterprise SOA with SecureSpan and JavaCaps
Layer 7: Enterprise SOA with SecureSpan and JavaCapsLayer 7: Enterprise SOA with SecureSpan and JavaCaps
Layer 7: Enterprise SOA with SecureSpan and JavaCaps
CA API Management
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...
kanimozhin
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshop
kanimozhin
 
1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architecture1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architecture
Cloud Genius
 
FS_Usage_Scenarios
FS_Usage_ScenariosFS_Usage_Scenarios
FS_Usage_Scenarios
Kevin Kao
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
European Collaboration Summit
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
TrongMinhHoang1
 
Cloud security privacy- org
Cloud security  privacy- orgCloud security  privacy- org
Cloud security privacy- org
Dharmalingam S
 
Securing Web Application, Services and Servers
Securing Web Application, Services and ServersSecuring Web Application, Services and Servers
Securing Web Application, Services and Servers
Dr.S.Jagadeesh Kumar
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
Security Innovation
 
Layer 7: Managing SOA Security and Operations with SecureSpan
Layer 7: Managing SOA Security and Operations with SecureSpanLayer 7: Managing SOA Security and Operations with SecureSpan
Layer 7: Managing SOA Security and Operations with SecureSpan
CA API Management
 
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
Teguh Febrianto Setiawan
 
Ad

Recently uploaded (20)

TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Mastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdfMastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdf
Spiral Mantra
 
TrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token ListingTrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token Listing
Trs Labs
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Mastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdfMastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdf
Spiral Mantra
 
TrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token ListingTrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token Listing
Trs Labs
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 

Web Api services using IBM Datapower

  • 1. WEB API Deliver Company Services as Cloud to Developers, 3rd parties etc… Tansu Daslı Osman Ozel
  • 2. DATAPOWER Key Points • Hardened security: It can act purely as a security gateway. • Appliance versatility: It is easy to add to the the network at various points to perform different functions. • XML lingua franca: The promise of XML-speak is uniformity, simplicity, and transparency of handling data. Being XML-centric from core upwards gives DataPower the ability to adapt to different roles. • Any-to-any transformation: The ability to transform any data format allows it to be an integration device. • Multi-protocol support: This allows it to be a integration device or bridge for heritage applications. Ease of Use • Installation: As a network appliance it can be up and running in literally a few minutes. • Development cycle: On-board Web GUI based approach to creating and managing applications gets rid of the develop-deploy round trip development methodology. • Development model: The modeling uses the building-block approach where the application is built using a collection of objects one on top of another. The granularity of these objects maps comfortably to architectural components of typical applications.
  • 3. DataPower Core services Multi-Protocol Gateway Web Service Proxy XML Firewall Web Application Firewall Access to a third-party Web service, described by a WSDL, is front-ended by the Web Service Proxy. Access to a specific operation, is controlled by an Authentication, Authorization, and Auditing Policy (AAA) that extracts identity information from the WS-Security Username-Token. Requests exceeding specified service level parameters are queued and bleed off at the specified rate. Access to all other operations is unrestricted. The XML firewall service is used to send and receive XML traffic over HTTP to and from XML-based applications. • Accept and send SOAP, raw XML, or unprocessed (binary) documents. • Decrypt, encrypt, filter, transform, and validate XML documents. • Route XML documents to the appropriate back-end service. • Sign documents and verify signatures. • Process large documents in the streaming mode. • Implement document-level security or service-level security. • Communicate with clients, servers, and peers with SSL encryption. An external client to connect to the Web application firewall service in DataPower. Once authenticated, request is forwarded to the back-end Web application. The Web application firewall service uses an AAA policy to validate users. In a production environment, you would also need to secure the connection from the Web application firewall service to the back-end Web application, using either a security token or SSL.
  • 4. Web Services & Policy Management Traffic throttling : This is a simplified model of controlling throughput of messages by discarding packets that go over a certain threshold. DataPower’s Limit field sets the threshold, and an interval is set for duration of throttling. Traffic shaping : An SLM that can improve delivery while maintaining SLAs on performance by protecting bandwidth. Custom SLM statements Count all (default) : The threshold level is applied to the resources specified by a resource class. Count errors : The threshold is based on errors. Back-end latency : The threshold is based on server latency. Internal latency : The threshold is based on internal latency (processing time). Total latency : The threshold is based on the sum of measured latencies.
  • 5. Security • Protocol-based security, including SSL • Message-based security, including digital signature generation and verification, as well as data encryption and decryption • The Authentication/Authorization/Audit (AAA) framework for access control • Federated Identity Management WS-Security Security Assertion Markup Language (SAML) XACML PEP/PDP Kerberos and SPNEGO XML threats Multiple-message XDoS attacks Unauthorized access attacks Data integrity/confidentiality attacks Systems compromise attacks Single-message xDOS attacks
  • 6. High Level Architecture operation SOAP WS SOAP WS Datapower cloud domain mw domain Security Throttle Developers 3rd Parties apigee/w2o/mashery/ibm/3scale Security Throttle soap-ws Monitoring Billing Developer Portal HTTP over XML Restfull WS restful-ws D M Z C O M P A N Y Monit oring OTA Developer Portal confluence developer .company .com.tr Reverse Proxy C L O U D
  • 7. Questions for Shaping Strategy  Which services exposed to whom (3rd parties, external developers etc..)?  legal implications?  metrics to measure success (page visit or revenue etc..)?  aim (increasing the revenues, increase product loyalty or rebranding etc..)?  pricing model (free, developer pays, shared revenue, advertisement revenues, tired pricing etc..) ?  An effective Web API strategy is essential in a market where access really is everything. 1  Community is important for success.  web api management platform place (inside company or cloud)?  agrements with incubation centers?

Editor's Notes

  • #7: domain based management, different operation groups can use datapowerdomains can be used to isolate the different usage scenariosdatapower capabilities: security (message level, transport level), throttling the load, reverse proxydeveloper portal: service documentations, register api, search api, register user, service usage statistics, how to docs etc…billing: how to bill usages ?
  • #8: * Source: 1 ftp://public.dhe.ibm.com/software/solutions/soa/pdfs/ebook-web-api-management.pdf