Cloud Computing and SOA Convergence in Your Enterprise: A Step ...
Cloud Computing and SOA Convergence in Your Enterprise: A Step ...
Cloud Computing and SOA Convergence in Your Enterprise: A Step ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
208 Chapter 11 Mak<strong>in</strong>g the Move to <strong>Cloud</strong> <strong>Comput<strong>in</strong>g</strong><br />
the network. Aga<strong>in</strong>, you need to test for performance by actually us<strong>in</strong>g the<br />
services, <strong>and</strong> adjust your platform, the number of services you leverage, <strong>and</strong><br />
the way those services are designed to optimize the performance of your<br />
architecture.<br />
Security is not a platform or a piece of software that exists on-premise or<br />
on cloud comput<strong>in</strong>g platforms. If done right, it should be systemic to the holistic<br />
architecture, no matter how much of it is on-premise or cloud comput<strong>in</strong>g–delivered.<br />
You address security by creat<strong>in</strong>g a strategy <strong>and</strong> a model to<br />
secure your architecture based on the requirements you identified. Then you<br />
select the proper approach <strong>and</strong> support<strong>in</strong>g enabl<strong>in</strong>g technology. Security<br />
typically centers on identity management <strong>and</strong> the st<strong>and</strong>ards that support<br />
identity management.<br />
With the <strong>in</strong>creas<strong>in</strong>g <strong>in</strong>terest <strong>in</strong> identity management, <strong>in</strong> support of more<br />
complex <strong>and</strong> distributed architectures such as <strong>SOA</strong> <strong>and</strong> <strong>SOA</strong> us<strong>in</strong>g cloud<br />
comput<strong>in</strong>g, the need for st<strong>and</strong>ards to better def<strong>in</strong>e this space has arisen. These<br />
st<strong>and</strong>ards all aim to b<strong>in</strong>d together identity management systems with<strong>in</strong> all organizations<br />
<strong>in</strong>to a unified whole, allow<strong>in</strong>g for everyone to be known to everyone<br />
else, securely.<br />
Why do we need identity management It is a fact that services are not<br />
for <strong>in</strong>ternal use anymore, as is the case when leverag<strong>in</strong>g cloud comput<strong>in</strong>g.<br />
Those who leverage services (consumers) <strong>and</strong> those who produce services<br />
(providers) must be known to each other; otherwise, we risk <strong>in</strong>vok<strong>in</strong>g malicious<br />
or <strong>in</strong>correct behavior, which could cost us dearly. This is clearly the<br />
case with cloud comput<strong>in</strong>g that leverages services.<br />
Governance br<strong>in</strong>gs its own set of issues when consider<strong>in</strong>g architecture <strong>and</strong><br />
cloud comput<strong>in</strong>g. While there are governance systems that are cloud delivered,<br />
<strong>and</strong> they work well for some types of architecture, governance systems<br />
that implement, manage, <strong>and</strong> enforce policies are runtime <strong>in</strong> nature <strong>and</strong> are<br />
typically on-premise.<br />
Issues to look out for here aga<strong>in</strong> <strong>in</strong>clude performance, s<strong>in</strong>ce, <strong>in</strong> some <strong>in</strong>stances,<br />
execut<strong>in</strong>g policies could cause latency issues. Also important is the<br />
governance solution’s ability to govern resources, which are typically clouddelivered<br />
services. This means hav<strong>in</strong>g the ability to track remote services<br />
with<strong>in</strong> the governance technology’s repository as well as to monitor those services<br />
dur<strong>in</strong>g runtime.<br />
Management of a widely distributed <strong>and</strong> complex architecture, such as<br />
<strong>SOA</strong> us<strong>in</strong>g cloud comput<strong>in</strong>g, requires a management technology that can see