18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

312 <strong>B2B</strong> <strong>Integration</strong> — A <strong>Practical</strong> <strong>Guide</strong> <strong>to</strong> <strong>Collaborative</strong> E-<strong>commerce</strong><br />

Commission a DMZ (demilitarized zone)<br />

As a crucial part of e-security revamping efforts, a company should<br />

commission a DMZ that is delineated by an external and an internal<br />

firewall. The external firewall secures the systems inside the DMZ from<br />

external intruders. It provides access <strong>to</strong> these systems only <strong>to</strong> authorized<br />

parties. The internal firewall, on the other hand, prevents unauthorized<br />

access <strong>to</strong> enterprise networks and systems from the DMZ.<br />

Formulate policies for detecting intrusion<br />

Formulate corporate security policies that require logging and minute<br />

level inspection of every inbound and outbound call. This will assist in<br />

identifying dubious activities and patterns leading <strong>to</strong> a network or<br />

system attack.<br />

Build an effective entitlements management system<br />

This system should be geared <strong>to</strong>wards setting up the entitlements and<br />

user access privileges for all the applications, independent of their<br />

respective platform. Such a system would eliminate the need for<br />

proprietary security components built in<strong>to</strong> each individual application.<br />

Implement cross-domain single sign-on<br />

Single Sign-on (SSO) enables the user <strong>to</strong> log in (by providing user ID<br />

and password) just once and then caching that information for the<br />

whole session until the user logs out. Once the user is logged in<br />

successfully, the user's identity can be shared and passed on from one<br />

system <strong>to</strong> another, thereby making it unnecessary <strong>to</strong> have a separate<br />

sign-on for each system. With a cross-domain single sign-on, this<br />

information can be passed over from one secured domain <strong>to</strong> another.<br />

10.8.2. <strong>B2B</strong>i software<br />

Your <strong>B2B</strong> integration software/server provides the primary source of<br />

access over the Internet. It acts as an external interface <strong>to</strong> a company's

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!