w3c workshop ws policy in the web service architecture n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
W3C Workshop WS-Policy in the Web Service Architecture PowerPoint Presentation
Download Presentation
W3C Workshop WS-Policy in the Web Service Architecture

play fullscreen
1 / 6

W3C Workshop WS-Policy in the Web Service Architecture

66 Views Download Presentation
Download Presentation

W3C Workshop WS-Policy in the Web Service Architecture

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. W3C WorkshopWS-Policy in theWeb Service Architecture October 2004

  2. Broker (UDDI) FindService PublishService FindServiceRequest PublishServiceMetadata(e.g. WSDL location) FindServiceResponse CreatePurchaseOrder CreatePurchaseOrderRequest CreatePurchaseOrderResponse Consumer Web Services Model SOAP/HTTP Provider

  3. Web Service Architecture Constraints • Described Interfaces • Design by contract • “Describe the messages, not the code” • Message-oriented • Messages exchanged in a platform independent way • Loosely Coupled Services • Decentralized authorities for developing, deploying, extending, versioning and discovering services • Loosely Coupled Protocol Specifications • Modular and composable • Services use any combination of protocol specifications • “mix and match”

  4. WS-* Specification Architecture Security Reliable Messaging Transactions Messaging Metadata WS-Policy,… XML Protocols

  5. WS-Policy within WS-*architecture • Framework for expressing Web service capabilities and requirements • WSDL is limited in its ability to do this • Increases the fidelity of the contract • For describing • Security • Reliable Messaging • Transactions • …. • Applies to everything in the architecture • Endpoints • Protocols • Protocol specifications • WS-Policy scope bounded by the architecture Contract WSDL MEPs XML Schema MessageFormats Domain Policies WS-Policy Constraints & Capabilities

  6. WS-Policy Usage Scenarios • Used by Provider • Provider Configuration • Validation • Used outside of Provider • Consumer Configuration • Validation • Discovery (UDDI)