Professional Documents
Culture Documents
Paper: Integrating Websphere Service Registry and Repository With Websphere Datapower
Paper: Integrating Websphere Service Registry and Repository With Websphere Datapower
Andrew White
Product description
WebSphere DataPower provides the ability to understand and act upon
application data as it traverses the network. While this application awareness is
not, in itself, a new networking concept, XML has accelerated its appeal and
complexity, that is, application awareness comes with many security, complexity,
and performance challenges. As a result, a new genre of hardened software,
hardware, and XML-centric appliances has arisen to bridge this gap.
ibm.com/redbooks
Value proposition
Integrating WebSphere Service Registry and Repository with WebSphere
DataPower provides several benefits:
Allows the creation of Web Service Proxy based upon a WSDL stored in
WSRR instead of a static file. If the WSDL is updated in WSRR, then the Web
Service Proxy synchronizing with that particular WSDL will also be updated
the next time WebSphere DataPower synchronizes with WSRR.
Using WSRRs policy attachment user interface, users can edit WSDL
documents attached to WS-Policies and the results of this edit will be updated
in WebSphere DataPower the next time synchronization occurs.
By extending the built-in integration between WSRR and WebSphere
DataPower, it is possible to configure a Web Service Proxy to dynamically
choose an endpoint at run time based on meta data stored in WSRR.
WSRR
IBM
WSRR
Subscription
Service
Requestor
Service
Provider
WSRR
IBM
Service
Provider
REST Query
Service
Requestor
Service
Provider
Service
Provider
Figure 2 Dynamic endpoint selection using WSRR and WebSphere DataPower
Scenario overview
JKHL Enterprises currently has an Account Creation service running in their
production environment. This service has recently been upgraded to run an
additional verifyCreation operation, as shown in Figure 3. This minor upgrade of
the service is backwards compatible with the first version.
Integration issues
JKHL Enterprises uses dynamic endpoints for service calls in WebSphere
DataPower.
In this endpoint lookup scenario, WSRR will be accessed to retrieve a single
matching endpoint for the latest version of the createAccount operation of the
AccountCreation service.
Uploading service definitions is explained in Service Lifecycle Governance Using
WebSphere Service Registry and RepositoryService Lifecycle Governance with
IBM WebSphere Service Registry and Repository V6.3, SG24-7793 and will not
be described in this paper.
Solution overview
The endpoint lookup solution shown in Figure 4 shows how the WebSphere
DataPower queries WSRR and selects the account creation service endpoint
that is set to be online in WSRR.
WSRR
IBM
REST Query
Account
Creation
V1_0
Service
Consumer
V1
Account
Creation
V1_1
Figure 4 Scenario overview
10
11
h. In the new window that appears, enter SSLProxyProfile in the Name field.
Select Reverse from the SSL Direction drop-down menu and click + next
to the Reverse (server) Crypto profile, as shown in Figure 7.
12
13
j. In the new window that appears, enter CryptoIDCreds in the Name field.
Click + next to the Crypto Key field, as shown in Figure 9.
14
l. In the new window that appears, enter the location of the key.p12 file that
you copied from step 1. Click Upload, click Continue, and the window will
close.
m. Enter the password to the key store in the Configure Crypto Key field (by
default, this is WebAS). Click Apply and the window will close.
n. In the Configure Crypto Identification Credentials window, click + next to
the Certificate field.
15
o. In the new window that appears, select key.p12 from the File Name
drop-down menu, as shown in Figure 11, enter the password for the key
store, and click Apply. The window will close.
16
17
h. Click Advanced and drag the icon onto the line, as shown in Figure 13.
i. Double-click the Advanced icon previously dragged onto the line. In the
new window that appears, select Fetch and click Next.
18
Note: This URL is a REST action that queries WSRR to select SOAP Service
Endpoints, which are classified as online and have the name space
http://jkhle.itso.ibm.com/AccountCreationV1/service.
19
k. Click the Advanced icon and drag it onto the line, as shown in Figure 15.
l. Double-click the Advanced icon previously dragged onto the line. In the
new window that appears, select Extract using Xpath and click Next.
20
Note: This XPath query will give you the actual SOAP endpoint to which you
route.
21
22
o. Click Done and the window will close. Click the Route icon and drag it
onto the line, as shown in Figure 18.
23
p. Double-click the Route icon previously dragged onto the line. In the new
window that appears, select Use Variable to Select Destination. Select
var:// and click Var Builder, enter JKHLE into the Context field, and enter
Endpoint into the Variable Name field, as shown in Figure 19.
24
25
26
27
28
Martin Keen
Nicole Hargrove
Ian Heritage
Prasad Imandi
Wendy Neave
Laura Olson
Bhargav Perepa
29
30
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area.
Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product, program, or service that
does not infringe any IBM intellectual property right may be used instead. However, it is the user's
responsibility to evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document.
The furnishing of this document does not give you any license to these patents. You can send license
inquiries, in writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive Armonk, NY 10504-1785 U.S.A.
The following paragraph does not apply to the United Kingdom or any other country where such
provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION
PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer
of express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may
make improvements and/or changes in the product(s) and/or the program(s) described in this publication at
any time without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in any
manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the
materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without
incurring any obligation to you.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm
the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on
the capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrates programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the
sample programs are written. These examples have not been thoroughly tested under all conditions. IBM,
therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. You may copy,
modify, and distribute these sample programs in any form without payment to IBM for the purposes of
developing, using, marketing, or distributing application programs conforming to IBM's application
programming interfaces.
Copyright International Business Machines Corporation 2009. All rights reserved.
Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by
GSA ADP Schedule Contract with IBM Corp.
31
Redpaper
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business
Machines Corporation in the United States, other countries, or both. These and other IBM trademarked
terms are marked on their first occurrence in this information with the appropriate symbol ( or ),
indicating US registered or common law trademarks owned by IBM at the time this information was
published. Such trademarks may also be registered or common law trademarks in other countries. A current
list of IBM trademarks is available on the Web at http://www.ibm.com/legal/copytrade.shtml
The following terms are trademarks of the International Business Machines Corporation in the United States,
other countries, or both:
DataPower
IBM
Redpaper
Redpapers
Redbooks (logo)
Tivoli
WebSphere
32