9.5. Security Considerations

The security implications of this scenario are not as risky as it might appear at first glance. If we look at the components behind the firewall, we see that their risk is constant that is, whatever risk they inherently have by way of being attached to an intranet that ultimately, is attached to the public Internet (Web proxies, mail transports) remains the same.

The third component, the connector engine, is the added risk in this scenario. If the connector machine is compromised in any way, the virtual connection would ultimately drop because, if the connector machine is unreachable, the Ping service would fail, thus breaking the whole solution. If somehow a rogue process manages to displace the e-Speak service ...

Get Web Services: A Java™ Developer’s Guide Using E-Speak now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.