Working with the SOA Policy Gateway Advanced Runtime pattern

The SOA Policy Gateway Advanced Runtime pattern consists of three major pieces of functionality; the files needed for security between the DataPower® and WSRR pattern scripts are retrieved, a domain is configured on DataPower, and finally promotion is configured.

When completed the following actions will have occurred:
  1. A new domain exists on the DataPower appliance specified.
  2. A WSRR Server Definition exists in the domain.
  3. The custom CLI script has been run against the DataPower domain.
  4. A WSRR Clustered environment with 'n' nodes will have been created and configured.
  5. Any DataPower signer certificates provided by the customer will have been uploaded to the CellDefaultTruststore of the WSRR cell.
  6. Promotion between the SOA Policy Gateway Advanced Runtime pattern WSRR cell and the SOA Policy Gateway Governance Master cell has been configured:
    1. Signer Certificates have been exchanged. The Signer Certificate of the Governance Dmgr is placed in the CellDefaultTrustStore of the Advanced cell, and the Signer Certificate of the Advanced cell Dmgr is placed in the CellDefaultTrustStore of the Governance cell.
    2. LTPA Keys will have been exchanged. The LTPA Key of the Governance cell is imported into the Advanced cell.
    3. Each host of the Governance Master WSRR cluster is added to the trusted realms of the Advanced cell. Each host of the Advanced cell WSRR cluster is added to the trusted realms of the Governance Master.
    4. The promotion properties file is configured if the cell was designated as either staging or production environment in the given inputs.
The current configuration enables you to do the following:
  1. Create services and policies, and govern them through the SOA policy lifecycle on WSRR (when staging and production environments have been provided), using the default Governance Enablement Profile (GEP).
  2. Create Web Service Proxies that can use the pre-created WSRR Server definition to build subscriptions.
Next, you must take additional steps to complete a fully secure production environment. For more information, see Security for the IBM SOA Policy Gateway Pattern patterns.

Concept Concept

Feedback

Timestamp icon Last updated: Thursday, 3 July 2014
http://publib.boulder.ibm.com/infocenter/prodconn/v1r0m0/topic/com.ibm.scenarios.soawdpwsrr.doc/topics/csoa2_working_with_advanced.htm