O'Reilly logo

DataPower SOA Appliance Administration, Deployment, and Best Practices by John Walczyk, David Shute, Helio L. P. Mota, Ronnie Mitra, Richard Kinard, Daniel Dickerson, Jan Bechtold, Gerry Kaplan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Custom Role-Based Management authentication and credential mapping
The DataPower built-in Role-Based Management (RBM) capabilities are robust and can accommodate most enterprise needs for securing access to the appliance. However, certain organizations might rely on a proprietary infrastructure for governing access to the appliance. In this case, you can extend the built-in RBM functionality using Extensible Stylesheet Language Transformation (XSLT).
You can customize two phases of the RBM process:
Authentication
Credential mapping
The key ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required