|
|
Авторизация |
|
|
Поиск по указателям |
|
|
|
|
|
|
|
|
|
|
Microsoft Corporation — Guidelines for Application Integration |
|
|
Предметный указатель |
Directories, extensible 68
Directories, integrating 72
Directories, meta-directories 68
Directory capability 126
Distributed Transaction Coordinator (DTC) 77
DTS (Data Transformation Services) 71
Dynamic data access 109
Encode/Decode capability 116
Encoding documents 89 116
Encryption 60 119
Encryption, secret key vs. public key 60
Environments, avoiding frequent rebuilds 14
Environments, choosing which to use 10
Environments, directories See directories
Environments, independence from specific technology 10
Environments, integration hub 8—9
Environments, monitoring See system monitoring
Environments, monitoring/maintaining See operational management
Environments, point-to-point 7—8
Environments, requirements for 10
Environments, security See security
Environments, stability, ensuring 67
Escalation rules 102
ETL (Extract, Transform, and Load) 12
event handling 67
Event handling by Microsoft technologies 93
Event handling, passive vs. active 122
event processing 79 98
Event Processing capability 98
Extensible directories 68
Extract, Transform, and Load (ETL) 12
Field Mapping 106
File transfer 116
File Transfer capability 116
File transfer, advantages of 116
File transfer, implementing application integration with 13
File/database access 110
Filtering data 108
forwarding messages 84 112
FTP 12. See also file transfer
Fully automated application integration 5. See also automated application integration
Fully automated application integration, combining with semi-automated application integration 6
Fully automated application integration, cost/benefit analysis 5
Fully automated application integration, manual override, impracticality of 6
Fully automated application integration, system breakdowns and 6
Functional-level authorization 58
Functoids 83
Health and Activity Tracker in BizTalk Server 94
HIS (Host Integration Server 2000) 71
Historical data mining 67
Host Integration Server 2000 (HIS) 71
Host Integration Server 2000 (HIS), host-based systemscommunicating directly with 71
HTTP 12
HTTP Basic authentication 56
HTTP requests, receiving/ delivering 72
Human involvement in application integration 13
Human Workflow Services (HWS) 77—78
Identity directory 126—127
Identity management 118
IIS (Internet Information Services) 72
Impersonation, in security context management 59
Implementing application integration 11—13
Implementing application integration with communications message protocols 12
Implementing application integration with direct data access 13
Implementing application integration with Extract, Transform, and Load 12
Implementing application integration with file transfer 13
Implementing application integration with human involvement 13
Implementing application integration with program calls 12
Implementing application integration with screen scraping 12
Implementing application integration with Web services 11
Increased usage, handling 64
Indirect addressing 111—112
Integrating directories 72
Integration hub environment 8—9
Integration hub environment, benefits and drawbacks of 9
Integration hub environment, number of interfaces needed for 9
Integration hub environment, scalability of 8—9
Integrity of data See data integrity
Internet Information Services (IIS) 72
Journals 39
Kerberos 117 56
Kerberos, reply attacks and 58
latency 38—39. See also concurrency
Long-running transactions 49—51
Long-running transactions, aborting if not complete in certain time 51
Long-running transactions, ACID requirements and 49
Long-running transactions, database locking and 49
Long-running transactions, grouping shorter transactions into 50
Long-running transactions, timing out 51
Mainframes, sharing resources on 71
Malicious attacks 64
managing transactions See transaction management
Manual application integration 4
Manual application integration, cost/benefit analysis 5
Manual application integration, efficiency of 4
Mapping data 105—106
merging data See aggregation
message correlation 114
Message delivery 112. See also pipelines
Message forwarding 84 112
Message instrumentation 114
Message Queuing 46—47 73 113
Message routing 110 84
Message state, and State Management capability 99
MessageBox 84
Messaging, transactional 46—47
Meta-directories 68
Microsoft Distributed Transaction Coordinator (DTC) 77
Microsoft Operations Manager (MOM) 75
Microsoft technologies, authentication See authentication
Microsoft technologies, authorization See authorization
Microsoft technologies, BizTalk Server 2004 See BizTalk Server 2004
Microsoft technologies, Business Activity Management 93
Microsoft technologies, change management 94
Microsoft technologies, event handling 93
Microsoft technologies, Host Integration Server 2000 (HIS) 71
Microsoft technologies, identity management 91
Microsoft technologies, information protection 91
Microsoft technologies, Microsoft Operations Manager (MOM) 75
Microsoft technologies, nonrepudiation 92
Microsoft technologies, operational management capabilities provided by 93
Microsoft technologies, profile management 92
Microsoft technologies, security capabilities provided by 90
Microsoft technologies, security context management 92
Microsoft technologies, SQL Server 2000 See SQL Server 2000
Microsoft technologies, system monitoring 94
Microsoft technologies, Windows Server 2003 See Windows Server 2003
Microsoft technologies, Windows SharePoint Services 75
Microsoft technologies, XML See XML
Microsoft Visual Studio .NET, and BizTalk Server 70
Modeling business processes 19—22
Modeling business processes, complex 19—22
Modeling business processes, complex, problems with 22
Modeling business processes, simple, examples of 19
Models See environments
MOM (Microsoft Operations Manager) 75
Monitoring business transactions 66—67 93 122
Monitoring performance 65
monitoring resources 65
Monitoring security 66
monitoring systems See system monitoring
Multicasting 112
Multifactorial authentication 56—57
Multistep processes, managing 98
Network monitoring, with Microsoft Operations Manager (MOM) 75
Network shares, authorization 57
nonrepudiation 92 121
Online analytical processing (OLAP) 71—72
Operational management 61—68
Operational management policy 61
| Operational management policy, components necessary in 61
Operational management policy, defining terms in 62
Operational management, capabilities provided by Microsoft technologies 93
Operational management, capabilities required for 62
Operational management, policy See operational management policy
Operational management, requirements, defining 62
Operational management, system monitoring See system monitoring
Operations capabilities 121—127
optimistic concurrency 38—39
Orchestration capability 97
Orchestration, BizTalk Server 78
Organizational issues 14
parsers, XML See XML parsers
Passive event handling 122
password management 57
Performance monitoring 65
Pessimistic concurrency 38
Pipelines, customizing 86
Pipelines, nonrepudiation support with 92
Point-to-point environment 7—8
Point-to-point environment, maximum number of connections 8
Point-to-point environment, problems with 8
Prioritization rules 102
Probing tests 63—64
Process state 99
Processing rules 77 100
Products, Microsoft See Microsoft technologies
Profile management 119
Profile management in BizTalk Server 92
Program calls, implementing application integration with 12
Protocol bridging 90
Protocols, communications message 12
Provisioning, automated 124
Public key encryption vs. secret key 60
Public key encryption, key size, and level of security 121
Publish/subscribe addressing 111
Receive ports, vs. receive locations 85
Regression testing 126
release management 126
Reply attacks, Kerberos and 58
Request/reply communications 110
Request/reply communications, implementing 88—89
Resilient systems, failure in 65
Resource monitoring 65
Role-based authorization 57
routing messages 84 110
Routing, content-based 112
Rules processing 77 100
Rules Processing capability 100
Scalability 6—10
Scalability of integration hub environment 8—9
Scalability, automated application integration and 6
Schedule capability 99—100
Scheduling services 79
Schema definition 103 81
Schema definition, example of 104
Schema definition, forms of 103
Schema recognition 105
Schemas, checking 105
Schemas, definition See schema definition
Schemas, preloading from standards organizations 103
Schemas, recognition 105
Schemas, validating 105
screen scraping 12
Secret key encryption, vs. public key 60
Security 53—61
Security context management 59 92 118
Security Context Management capability 118
Security of Web services See Web Services Security specification
Security policy 53—55
Security policy, components to include 54
Security policy, creating 54
Security policy, referencing other documents in 55
Security, audit log 66
Security, authentication See authentication
security, authorization See authorization
Security, capabilities 117—121
Security, capabilities provided by Microsoft technologies 90
Security, capabilities required for 55
Security, communication plan, creating 54
Security, context management See security context management
Security, data access log 66
Security, encryption See encryption
Security, guidelines, creating 54
Security, logs, ensuring security of 66
Security, monitoring 66
Security, policy See security policy
Security, requirements, defining 55—56
Security, risk analysis 56
Security, threat classification/ management 54
Security, token-based 58
Semantic mapping 106
Semi-automated application integration 4. See also automated application integration
Semi-automated application integration, combining with fully automated application integration 6
Semi-automated application integration, cost/benefit analysis 5
Semi-automated application integration, efficiency of 4
Serialization/deserialization 114
Service state 99
SharePoint 75
SharePoint Portal Server SSO system 91
Simulating human interface with applications 12
Single casting 113
Single sign-on (SSO) 91
SOAP requests, receiving/ delivering 72
SQL Server 2000 71—72
SQL Server 2000, Analysis Services 71—72 93
SQL Server 2000, Data Transformation Services 71
SSO system 91
Staged data access 109
State management 78 98—99
State Management capability 98—99
Storing messages in queues 46—47 73 113
Straight-through processing (STP) 30—33
Straight-through processing (STP) vs. composed applications 41
Straight-through processing (STP), business processing capabilities used in 31
Straight-through processing (STP), communications capabilities used in 32—33
Straight-through processing (STP), cost/benefit analysis 31
Straight-through processing (STP), Data Access capability 32
Straight-through processing (STP), data capabilities used in 32
Straight-through processing (STP), example of 31
Straight-through processing (STP), indirect access to applications, enabling 32
Straight-through processing (STP), Message Forwarding capability 32
Straight-through processing (STP), Serialization/Deserialization capability 33
Straight-through processing (STP), Transactional Delivery capability 33
Structure, centralized See integration hub environment
Structure, decentralized See point-to-point environment
Style sheets, XSLT 73
Subscription directory 126—127
Synchronizing data See data synchronization
Synchronous communication vs. asynchronous communication 28
Synchronous communication, capabilities required for 29
Synchronous communication, composed applications and 43
System breakdowns, and fully automated application integration 6
System configuration snapshot 125
System health 64. See also system monitoring
system monitoring 63—66 121
System monitoring, application health monitoring 63—65
System monitoring, baselining 121—122
System monitoring, data aggregation and 63
System monitoring, performance monitoring 65
System monitoring, probing tests 63—64
System monitoring, security monitoring 66
System monitoring, system health monitoring 63—65
System-level authorization 57
TCP/IP 12
Technical issues 14
Terminal emulation software, and screen scraping 12
Timed transactions 51
Token-based security 58
Tracking request response time 65
|
|
|
Реклама |
|
|
|
|
|
|