Summary

In this chapter, we learned the various options to design and implement a security solution for securing a BPEL process. We explored the security options and industry-leading practices to implement authentication, authorization, data security in transit, and denial of service attacks for SOA composite applications. In the next chapter, we will learn the architecture options to implement high availability for business services.

Get Oracle SOA BPEL Process Manager 11gR1 – A Hands-on Tutorial now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.